summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--glsa-200310-03.xml5
-rw-r--r--glsa-200310-04.xml7
-rw-r--r--glsa-200311-01.xml7
-rw-r--r--glsa-200311-02.xml3
-rw-r--r--glsa-200311-03.xml3
-rw-r--r--glsa-200311-04.xml1
-rw-r--r--glsa-200311-05.xml1
-rw-r--r--glsa-200311-06.xml3
-rw-r--r--glsa-200311-07.xml5
-rw-r--r--glsa-200311-08.xml3
-rw-r--r--glsa-200312-01.xml1
-rw-r--r--glsa-200312-03.xml9
-rw-r--r--glsa-200312-04.xml3
-rw-r--r--glsa-200312-05.xml3
-rw-r--r--glsa-200312-06.xml3
-rw-r--r--glsa-200312-07.xml9
-rw-r--r--glsa-200312-08.xml1
-rw-r--r--glsa-200401-01.xml21
-rw-r--r--glsa-200401-02.xml11
-rw-r--r--glsa-200401-03.xml15
-rw-r--r--glsa-200401-04.xml11
-rw-r--r--glsa-200402-01.xml25
-rw-r--r--glsa-200402-02.xml12
-rw-r--r--glsa-200402-03.xml11
-rw-r--r--glsa-200402-04.xml9
-rw-r--r--glsa-200402-05.xml11
-rw-r--r--glsa-200402-06.xml5
-rw-r--r--glsa-200402-07.xml9
-rw-r--r--glsa-200403-01.xml11
-rw-r--r--glsa-200403-02.xml11
-rw-r--r--glsa-200403-03.xml17
-rw-r--r--glsa-200403-04.xml15
-rw-r--r--glsa-200403-05.xml9
-rw-r--r--glsa-200403-06.xml15
-rw-r--r--glsa-200403-07.xml19
-rw-r--r--glsa-200403-08.xml18
-rw-r--r--glsa-200403-09.xml11
-rw-r--r--glsa-200403-10.xml11
-rw-r--r--glsa-200403-11.xml17
-rw-r--r--glsa-200403-12.xml15
-rw-r--r--glsa-200403-13.xml21
-rw-r--r--glsa-200403-14.xml15
-rw-r--r--glsa-200404-01.xml11
-rw-r--r--glsa-200404-02.xml11
-rw-r--r--glsa-200404-03.xml15
-rw-r--r--glsa-200404-04.xml13
-rw-r--r--glsa-200404-05.xml13
-rw-r--r--glsa-200404-06.xml11
-rw-r--r--glsa-200404-07.xml11
-rw-r--r--glsa-200404-08.xml5
-rw-r--r--glsa-200404-09.xml11
-rw-r--r--glsa-200404-10.xml13
-rw-r--r--glsa-200404-11.xml11
-rw-r--r--glsa-200404-12.xml13
-rw-r--r--glsa-200404-13.xml13
-rw-r--r--glsa-200404-14.xml14
-rw-r--r--glsa-200404-15.xml17
-rw-r--r--glsa-200404-16.xml9
-rw-r--r--glsa-200404-17.xml15
-rw-r--r--glsa-200404-18.xml15
-rw-r--r--glsa-200404-19.xml9
-rw-r--r--glsa-200404-20.xml17
-rw-r--r--glsa-200404-21.xml9
-rw-r--r--glsa-200405-01.xml11
-rw-r--r--glsa-200405-02.xml13
-rw-r--r--glsa-200405-03.xml11
-rw-r--r--glsa-200405-04.xml29
-rw-r--r--glsa-200405-05.xml11
-rw-r--r--glsa-200405-06.xml11
-rw-r--r--glsa-200405-07.xml11
-rw-r--r--glsa-200405-08.xml11
-rw-r--r--glsa-200405-09.xml13
-rw-r--r--glsa-200405-10.xml13
-rw-r--r--glsa-200405-11.xml11
-rw-r--r--glsa-200405-12.xml11
-rw-r--r--glsa-200405-13.xml11
-rw-r--r--glsa-200405-14.xml11
-rw-r--r--glsa-200405-15.xml13
-rw-r--r--glsa-200405-16.xml17
-rw-r--r--glsa-200405-17.xml13
-rw-r--r--glsa-200405-18.xml13
-rw-r--r--glsa-200405-19.xml11
-rw-r--r--glsa-200405-20.xml13
-rw-r--r--glsa-200405-21.xml15
-rw-r--r--glsa-200405-22.xml17
-rw-r--r--glsa-200405-23.xml13
-rw-r--r--glsa-200405-24.xml15
-rw-r--r--glsa-200405-25.xml13
-rw-r--r--glsa-200406-01.xml19
-rw-r--r--glsa-200406-02.xml11
-rw-r--r--glsa-200406-03.xml13
-rw-r--r--glsa-200406-04.xml13
-rw-r--r--glsa-200406-05.xml17
-rw-r--r--glsa-200406-06.xml21
-rw-r--r--glsa-200406-07.xml15
-rw-r--r--glsa-200406-08.xml13
-rw-r--r--glsa-200406-09.xml9
-rw-r--r--glsa-200406-10.xml11
-rw-r--r--glsa-200406-11.xml11
-rw-r--r--glsa-200406-12.xml13
-rw-r--r--glsa-200406-13.xml11
-rw-r--r--glsa-200406-14.xml11
-rw-r--r--glsa-200406-15.xml13
-rw-r--r--glsa-200406-16.xml13
-rw-r--r--glsa-200406-17.xml15
-rw-r--r--glsa-200406-18.xml11
-rw-r--r--glsa-200406-19.xml11
-rw-r--r--glsa-200406-20.xml33
-rw-r--r--glsa-200406-21.xml11
-rw-r--r--glsa-200406-22.xml11
-rw-r--r--glsa-200407-01.xml11
-rw-r--r--glsa-200407-02.xml31
-rw-r--r--glsa-200407-03.xml11
-rw-r--r--glsa-200407-04.xml11
-rw-r--r--glsa-200407-05.xml15
-rw-r--r--glsa-200407-06.xml11
-rw-r--r--glsa-200407-07.xml11
-rw-r--r--glsa-200407-08.xml17
-rw-r--r--glsa-200407-09.xml13
-rw-r--r--glsa-200407-10.xml11
-rw-r--r--glsa-200407-11.xml11
-rw-r--r--glsa-200407-12.xml7
-rw-r--r--glsa-200407-13.xml21
-rw-r--r--glsa-200407-14.xml23
-rw-r--r--glsa-200407-15.xml15
-rw-r--r--glsa-200407-16.xml13
-rw-r--r--glsa-200407-17.xml11
-rw-r--r--glsa-200407-18.xml11
-rw-r--r--glsa-200407-19.xml11
-rw-r--r--glsa-200407-20.xml11
-rw-r--r--glsa-200407-21.xml15
-rw-r--r--glsa-200407-22.xml13
-rw-r--r--glsa-200407-23.xml11
-rw-r--r--glsa-200408-01.xml11
-rw-r--r--glsa-200408-02.xml15
-rw-r--r--glsa-200408-03.xml17
-rw-r--r--glsa-200408-04.xml19
-rw-r--r--glsa-200408-05.xml15
-rw-r--r--glsa-200408-06.xml15
-rw-r--r--glsa-200408-07.xml17
-rw-r--r--glsa-200408-08.xml17
-rw-r--r--glsa-200408-09.xml15
-rw-r--r--glsa-200408-10.xml15
-rw-r--r--glsa-200408-11.xml13
-rw-r--r--glsa-200408-12.xml13
-rw-r--r--glsa-200408-13.xml21
-rw-r--r--glsa-200408-14.xml15
-rw-r--r--glsa-200408-15.xml13
-rw-r--r--glsa-200408-16.xml9
-rw-r--r--glsa-200408-17.xml17
-rw-r--r--glsa-200408-18.xml13
-rw-r--r--glsa-200408-19.xml13
-rw-r--r--glsa-200408-20.xml19
-rw-r--r--glsa-200408-21.xml15
-rw-r--r--glsa-200408-22.xml19
-rw-r--r--glsa-200408-23.xml19
-rw-r--r--glsa-200408-24.xml13
-rw-r--r--glsa-200408-25.xml15
-rw-r--r--glsa-200408-26.xml15
-rw-r--r--glsa-200408-27.xml23
-rw-r--r--glsa-200409-01.xml13
-rw-r--r--glsa-200409-02.xml15
-rw-r--r--glsa-200409-03.xml13
-rw-r--r--glsa-200409-04.xml13
-rw-r--r--glsa-200409-05.xml15
-rw-r--r--glsa-200409-06.xml15
-rw-r--r--glsa-200409-07.xml15
-rw-r--r--glsa-200409-08.xml15
-rw-r--r--glsa-200409-09.xml21
-rw-r--r--glsa-200409-10.xml15
-rw-r--r--glsa-200409-11.xml17
-rw-r--r--glsa-200409-12.xml29
-rw-r--r--glsa-200409-13.xml21
-rw-r--r--glsa-200409-14.xml15
-rw-r--r--glsa-200409-15.xml25
-rw-r--r--glsa-200409-16.xml17
-rw-r--r--glsa-200409-17.xml17
-rw-r--r--glsa-200409-18.xml17
-rw-r--r--glsa-200409-19.xml17
-rw-r--r--glsa-200409-20.xml17
-rw-r--r--glsa-200409-21.xml29
-rw-r--r--glsa-200409-22.xml19
-rw-r--r--glsa-200409-23.xml15
-rw-r--r--glsa-200409-24.xml17
-rw-r--r--glsa-200409-25.xml19
-rw-r--r--glsa-200409-26.xml29
-rw-r--r--glsa-200409-27.xml13
-rw-r--r--glsa-200409-28.xml29
-rw-r--r--glsa-200409-29.xml23
-rw-r--r--glsa-200409-30.xml21
-rw-r--r--glsa-200409-31.xml21
-rw-r--r--glsa-200409-32.xml19
-rw-r--r--glsa-200409-33.xml17
-rw-r--r--glsa-200409-34.xml27
-rw-r--r--glsa-200409-35.xml17
-rw-r--r--glsa-200410-01.xml19
-rw-r--r--glsa-200410-02.xml19
-rw-r--r--glsa-200410-03.xml19
-rw-r--r--glsa-200410-04.xml25
-rw-r--r--glsa-200410-05.xml15
-rw-r--r--glsa-200410-06.xml15
-rw-r--r--glsa-200410-07.xml17
-rw-r--r--glsa-200410-08.xml19
-rw-r--r--glsa-200410-09.xml19
-rw-r--r--glsa-200410-10.xml15
-rw-r--r--glsa-200410-11.xml19
-rw-r--r--glsa-200410-12.xml17
-rw-r--r--glsa-200410-13.xml17
-rw-r--r--glsa-200410-14.xml21
-rw-r--r--glsa-200410-15.xml17
-rw-r--r--glsa-200410-16.xml17
-rw-r--r--glsa-200410-17.xml27
-rw-r--r--glsa-200410-18.xml19
-rw-r--r--glsa-200410-19.xml13
-rw-r--r--glsa-200410-20.xml17
-rw-r--r--glsa-200410-21.xml23
-rw-r--r--glsa-200410-22.xml25
-rw-r--r--glsa-200410-23.xml19
-rw-r--r--glsa-200410-24.xml15
-rw-r--r--glsa-200410-25.xml15
-rw-r--r--glsa-200410-26.xml15
-rw-r--r--glsa-200410-27.xml15
-rw-r--r--glsa-200410-28.xml15
-rw-r--r--glsa-200410-29.xml17
-rw-r--r--glsa-200410-30.xml23
-rw-r--r--glsa-200410-31.xml17
-rw-r--r--glsa-200411-01.xml11
-rw-r--r--glsa-200411-02.xml15
-rw-r--r--glsa-200411-03.xml15
-rw-r--r--glsa-200411-04.xml17
-rw-r--r--glsa-200411-05.xml15
-rw-r--r--glsa-200411-06.xml17
-rw-r--r--glsa-200411-07.xml17
-rw-r--r--glsa-200411-08.xml15
-rw-r--r--glsa-200411-09.xml15
-rw-r--r--glsa-200411-10.xml13
-rw-r--r--glsa-200411-11.xml19
-rw-r--r--glsa-200411-12.xml15
-rw-r--r--glsa-200411-13.xml19
-rw-r--r--glsa-200411-14.xml19
-rw-r--r--glsa-200411-15.xml15
-rw-r--r--glsa-200411-16.xml15
-rw-r--r--glsa-200411-17.xml15
-rw-r--r--glsa-200411-18.xml13
-rw-r--r--glsa-200411-19.xml19
-rw-r--r--glsa-200411-20.xml13
-rw-r--r--glsa-200411-21.xml19
-rw-r--r--glsa-200411-22.xml15
-rw-r--r--glsa-200411-23.xml17
-rw-r--r--glsa-200411-24.xml13
-rw-r--r--glsa-200411-25.xml17
-rw-r--r--glsa-200411-26.xml23
-rw-r--r--glsa-200411-27.xml21
-rw-r--r--glsa-200411-28.xml17
-rw-r--r--glsa-200411-29.xml17
-rw-r--r--glsa-200411-30.xml15
-rw-r--r--glsa-200411-31.xml13
-rw-r--r--glsa-200411-32.xml15
-rw-r--r--glsa-200411-33.xml15
-rw-r--r--glsa-200411-34.xml21
-rw-r--r--glsa-200411-35.xml15
-rw-r--r--glsa-200411-36.xml17
-rw-r--r--glsa-200411-37.xml13
-rw-r--r--glsa-200411-38.xml21
-rw-r--r--glsa-200412-01.xml19
-rw-r--r--glsa-200412-02.xml21
-rw-r--r--glsa-200412-03.xml15
-rw-r--r--glsa-200412-04.xml15
-rw-r--r--glsa-200412-05.xml13
-rw-r--r--glsa-200412-06.xml13
-rw-r--r--glsa-200412-07.xml15
-rw-r--r--glsa-200412-08.xml17
-rw-r--r--glsa-200412-09.xml15
-rw-r--r--glsa-200412-10.xml17
-rw-r--r--glsa-200412-11.xml15
-rw-r--r--glsa-200412-12.xml17
-rw-r--r--glsa-200412-13.xml15
-rw-r--r--glsa-200412-14.xml31
-rw-r--r--glsa-200412-15.xml21
-rw-r--r--glsa-200412-16.xml21
-rw-r--r--glsa-200412-17.xml21
-rw-r--r--glsa-200412-18.xml15
-rw-r--r--glsa-200412-19.xml17
-rw-r--r--glsa-200412-20.xml15
-rw-r--r--glsa-200412-21.xml13
-rw-r--r--glsa-200412-22.xml15
-rw-r--r--glsa-200412-23.xml15
-rw-r--r--glsa-200412-24.xml15
-rw-r--r--glsa-200412-25.xml23
-rw-r--r--glsa-200412-26.xml15
-rw-r--r--glsa-200412-27.xml11
-rw-r--r--glsa-200501-01.xml15
-rw-r--r--glsa-200501-02.xml19
-rw-r--r--glsa-200501-03.xml27
-rw-r--r--glsa-200501-04.xml15
-rw-r--r--glsa-200501-05.xml15
-rw-r--r--glsa-200501-06.xml15
-rw-r--r--glsa-200501-07.xml17
-rw-r--r--glsa-200501-08.xml19
-rw-r--r--glsa-200501-09.xml13
-rw-r--r--glsa-200501-10.xml15
-rw-r--r--glsa-200501-11.xml15
-rw-r--r--glsa-200501-12.xml15
-rw-r--r--glsa-200501-13.xml15
-rw-r--r--glsa-200501-14.xml15
-rw-r--r--glsa-200501-15.xml13
-rw-r--r--glsa-200501-16.xml13
-rw-r--r--glsa-200501-17.xml17
-rw-r--r--glsa-200501-18.xml13
-rw-r--r--glsa-200501-19.xml17
-rw-r--r--glsa-200501-20.xml15
-rw-r--r--glsa-200501-21.xml15
-rw-r--r--glsa-200501-22.xml15
-rw-r--r--glsa-200501-23.xml19
-rw-r--r--glsa-200501-24.xml15
-rw-r--r--glsa-200501-25.xml25
-rw-r--r--glsa-200501-26.xml13
-rw-r--r--glsa-200501-27.xml25
-rw-r--r--glsa-200501-28.xml15
-rw-r--r--glsa-200501-29.xml15
-rw-r--r--glsa-200501-30.xml15
-rw-r--r--glsa-200501-31.xml25
-rw-r--r--glsa-200501-32.xml17
-rw-r--r--glsa-200501-33.xml17
-rw-r--r--glsa-200501-34.xml21
-rw-r--r--glsa-200501-35.xml13
-rw-r--r--glsa-200501-36.xml21
-rw-r--r--glsa-200501-37.xml15
-rw-r--r--glsa-200501-38.xml15
-rw-r--r--glsa-200501-39.xml19
-rw-r--r--glsa-200501-40.xml15
-rw-r--r--glsa-200501-41.xml13
-rw-r--r--glsa-200501-42.xml15
-rw-r--r--glsa-200501-43.xml13
-rw-r--r--glsa-200501-44.xml17
-rw-r--r--glsa-200501-45.xml15
-rw-r--r--glsa-200501-46.xml21
-rw-r--r--glsa-200502-01.xml17
-rw-r--r--glsa-200502-02.xml17
-rw-r--r--glsa-200502-03.xml19
-rw-r--r--glsa-200502-04.xml19
-rw-r--r--glsa-200502-05.xml13
-rw-r--r--glsa-200502-06.xml13
-rw-r--r--glsa-200502-07.xml21
-rw-r--r--glsa-200502-08.xml21
-rw-r--r--glsa-200502-09.xml15
-rw-r--r--glsa-200502-10.xml15
-rw-r--r--glsa-200502-11.xml15
-rw-r--r--glsa-200502-12.xml13
-rw-r--r--glsa-200502-13.xml15
-rw-r--r--glsa-200502-14.xml13
-rw-r--r--glsa-200502-15.xml15
-rw-r--r--glsa-200502-16.xml15
-rw-r--r--glsa-200502-17.xml27
-rw-r--r--glsa-200502-18.xml15
-rw-r--r--glsa-200502-19.xml13
-rw-r--r--glsa-200502-20.xml17
-rw-r--r--glsa-200502-21.xml17
-rw-r--r--glsa-200502-22.xml15
-rw-r--r--glsa-200502-23.xml13
-rw-r--r--glsa-200502-24.xml21
-rw-r--r--glsa-200502-25.xml15
-rw-r--r--glsa-200502-26.xml15
-rw-r--r--glsa-200502-27.xml15
-rw-r--r--glsa-200502-28.xml19
-rw-r--r--glsa-200502-29.xml15
-rw-r--r--glsa-200502-30.xml15
-rw-r--r--glsa-200502-31.xml17
-rw-r--r--glsa-200502-32.xml14
-rw-r--r--glsa-200502-33.xml21
-rw-r--r--glsa-200503-01.xml13
-rw-r--r--glsa-200503-02.xml19
-rw-r--r--glsa-200503-03.xml19
-rw-r--r--glsa-200503-04.xml17
-rw-r--r--glsa-200503-05.xml21
-rw-r--r--glsa-200503-06.xml15
-rw-r--r--glsa-200503-07.xml25
-rw-r--r--glsa-200503-08.xml15
-rw-r--r--glsa-200503-09.xml15
-rw-r--r--glsa-200503-10.xml49
-rw-r--r--glsa-200503-11.xml15
-rw-r--r--glsa-200503-12.xml15
-rw-r--r--glsa-200503-13.xml15
-rw-r--r--glsa-200503-14.xml11
-rw-r--r--glsa-200503-15.xml13
-rw-r--r--glsa-200503-16.xml23
-rw-r--r--glsa-200503-17.xml15
-rw-r--r--glsa-200503-18.xml15
-rw-r--r--glsa-200503-19.xml19
-rw-r--r--glsa-200503-20.xml15
-rw-r--r--glsa-200503-21.xml17
-rw-r--r--glsa-200503-22.xml11
-rw-r--r--glsa-200503-23.xml15
-rw-r--r--glsa-200503-24.xml13
-rw-r--r--glsa-200503-25.xml15
-rw-r--r--glsa-200503-26.xml17
-rw-r--r--glsa-200503-27.xml11
-rw-r--r--glsa-200503-28.xml17
-rw-r--r--glsa-200503-29.xml17
-rw-r--r--glsa-200503-30.xml49
-rw-r--r--glsa-200503-31.xml21
-rw-r--r--glsa-200503-32.xml23
-rw-r--r--glsa-200503-33.xml17
-rw-r--r--glsa-200503-34.xml15
-rw-r--r--glsa-200503-35.xml17
-rw-r--r--glsa-200503-36.xml15
-rw-r--r--glsa-200503-37.xml19
-rw-r--r--glsa-200504-01.xml17
-rw-r--r--glsa-200504-02.xml13
-rw-r--r--glsa-200504-03.xml13
-rw-r--r--glsa-200504-04.xml15
-rw-r--r--glsa-200504-05.xml21
-rw-r--r--glsa-200504-06.xml15
-rw-r--r--glsa-200504-07.xml15
-rw-r--r--glsa-200504-08.xml17
-rw-r--r--glsa-200504-09.xml15
-rw-r--r--glsa-200504-10.xml15
-rw-r--r--glsa-200504-11.xml17
-rw-r--r--glsa-200504-12.xml13
-rw-r--r--glsa-200504-13.xml19
-rw-r--r--glsa-200504-14.xml17
-rw-r--r--glsa-200504-15.xml25
-rw-r--r--glsa-200504-16.xml13
-rw-r--r--glsa-200504-17.xml13
-rw-r--r--glsa-200504-18.xml33
-rw-r--r--glsa-200504-19.xml15
-rw-r--r--glsa-200504-20.xml13
-rw-r--r--glsa-200504-21.xml17
-rw-r--r--glsa-200504-22.xml13
-rw-r--r--glsa-200504-23.xml15
-rw-r--r--glsa-200504-24.xml17
-rw-r--r--glsa-200504-25.xml13
-rw-r--r--glsa-200504-26.xml15
-rw-r--r--glsa-200504-27.xml9
-rw-r--r--glsa-200504-28.xml17
-rw-r--r--glsa-200504-29.xml15
-rw-r--r--glsa-200504-30.xml13
-rw-r--r--glsa-200505-01.xml33
-rw-r--r--glsa-200505-02.xml15
-rw-r--r--glsa-200505-03.xml41
-rw-r--r--glsa-200505-04.xml13
-rw-r--r--glsa-200505-05.xml17
-rw-r--r--glsa-200505-06.xml21
-rw-r--r--glsa-200505-07.xml13
-rw-r--r--glsa-200505-08.xml17
-rw-r--r--glsa-200505-09.xml15
-rw-r--r--glsa-200505-10.xml13
-rw-r--r--glsa-200505-11.xml25
-rw-r--r--glsa-200505-12.xml18
-rw-r--r--glsa-200505-13.xml17
-rw-r--r--glsa-200505-14.xml15
-rw-r--r--glsa-200505-15.xml17
-rw-r--r--glsa-200505-16.xml17
-rw-r--r--glsa-200505-17.xml15
-rw-r--r--glsa-200505-18.xml15
-rw-r--r--glsa-200505-19.xml11
-rw-r--r--glsa-200505-20.xml19
-rw-r--r--glsa-200506-01.xml13
-rw-r--r--glsa-200506-02.xml15
-rw-r--r--glsa-200506-03.xml15
-rw-r--r--glsa-200506-04.xml19
-rw-r--r--glsa-200506-05.xml15
-rw-r--r--glsa-200506-06.xml19
-rw-r--r--glsa-200506-07.xml15
-rw-r--r--glsa-200506-08.xml19
-rw-r--r--glsa-200506-09.xml17
-rw-r--r--glsa-200506-10.xml15
-rw-r--r--glsa-200506-11.xml21
-rw-r--r--glsa-200506-12.xml13
-rw-r--r--glsa-200506-13.xml15
-rw-r--r--glsa-200506-14.xml19
-rw-r--r--glsa-200506-15.xml15
-rw-r--r--glsa-200506-16.xml15
-rw-r--r--glsa-200506-17.xml21
-rw-r--r--glsa-200506-18.xml15
-rw-r--r--glsa-200506-19.xml15
-rw-r--r--glsa-200506-20.xml27
-rw-r--r--glsa-200506-21.xml15
-rw-r--r--glsa-200506-22.xml15
-rw-r--r--glsa-200506-23.xml17
-rw-r--r--glsa-200506-24.xml17
-rw-r--r--glsa-200507-01.xml17
-rw-r--r--glsa-200507-02.xml15
-rw-r--r--glsa-200507-03.xml15
-rw-r--r--glsa-200507-04.xml15
-rw-r--r--glsa-200507-05.xml13
-rw-r--r--glsa-200507-06.xml17
-rw-r--r--glsa-200507-07.xml15
-rw-r--r--glsa-200507-08.xml17
-rw-r--r--glsa-200507-09.xml17
-rw-r--r--glsa-200507-10.xml17
-rw-r--r--glsa-200507-11.xml19
-rw-r--r--glsa-200507-12.xml19
-rw-r--r--glsa-200507-13.xml15
-rw-r--r--glsa-200507-14.xml15
-rw-r--r--glsa-200507-15.xml15
-rw-r--r--glsa-200507-16.xml15
-rw-r--r--glsa-200507-17.xml17
-rw-r--r--glsa-200507-18.xml17
-rw-r--r--glsa-200507-19.xml15
-rw-r--r--glsa-200507-20.xml13
-rw-r--r--glsa-200507-21.xml13
-rw-r--r--glsa-200507-22.xml15
-rw-r--r--glsa-200507-23.xml15
-rw-r--r--glsa-200507-24.xml17
-rw-r--r--glsa-200507-25.xml17
-rw-r--r--glsa-200507-26.xml23
-rw-r--r--glsa-200507-27.xml27
-rw-r--r--glsa-200507-28.xml19
-rw-r--r--glsa-200507-29.xml17
-rw-r--r--glsa-200508-01.xml21
-rw-r--r--glsa-200508-02.xml15
-rw-r--r--glsa-200508-03.xml17
-rw-r--r--glsa-200508-04.xml15
-rw-r--r--glsa-200508-05.xml15
-rw-r--r--glsa-200508-06.xml17
-rw-r--r--glsa-200508-07.xml13
-rw-r--r--glsa-200508-08.xml21
-rw-r--r--glsa-200508-09.xml17
-rw-r--r--glsa-200508-10.xml19
-rw-r--r--glsa-200508-11.xml17
-rw-r--r--glsa-200508-12.xml17
-rw-r--r--glsa-200508-13.xml19
-rw-r--r--glsa-200508-14.xml17
-rw-r--r--glsa-200508-15.xml17
-rw-r--r--glsa-200508-16.xml15
-rw-r--r--glsa-200508-17.xml15
-rw-r--r--glsa-200508-18.xml15
-rw-r--r--glsa-200508-19.xml15
-rw-r--r--glsa-200508-20.xml19
-rw-r--r--glsa-200508-21.xml15
-rw-r--r--glsa-200508-22.xml17
-rw-r--r--glsa-200509-01.xml13
-rw-r--r--glsa-200509-02.xml17
-rw-r--r--glsa-200509-03.xml17
-rw-r--r--glsa-200509-04.xml17
-rw-r--r--glsa-200509-05.xml15
-rw-r--r--glsa-200509-06.xml15
-rw-r--r--glsa-200509-07.xml13
-rw-r--r--glsa-200509-08.xml17
-rw-r--r--glsa-200509-09.xml15
-rw-r--r--glsa-200509-10.xml13
-rw-r--r--glsa-200509-11.xml37
-rw-r--r--glsa-200509-12.xml19
-rw-r--r--glsa-200509-13.xml17
-rw-r--r--glsa-200509-14.xml13
-rw-r--r--glsa-200509-15.xml15
-rw-r--r--glsa-200509-16.xml17
-rw-r--r--glsa-200509-17.xml15
-rw-r--r--glsa-200509-18.xml19
-rw-r--r--glsa-200509-19.xml17
-rw-r--r--glsa-200509-20.xml15
-rw-r--r--glsa-200509-21.xml15
-rw-r--r--glsa-200510-01.xml13
-rw-r--r--glsa-200510-02.xml15
-rw-r--r--glsa-200510-03.xml17
-rw-r--r--glsa-200510-04.xml15
-rw-r--r--glsa-200510-05.xml17
-rw-r--r--glsa-200510-06.xml15
-rw-r--r--glsa-200510-07.xml15
-rw-r--r--glsa-200510-08.xml11
-rw-r--r--glsa-200510-09.xml13
-rw-r--r--glsa-200510-10.xml15
-rw-r--r--glsa-200510-11.xml15
-rw-r--r--glsa-200510-12.xml17
-rw-r--r--glsa-200510-13.xml13
-rw-r--r--glsa-200510-14.xml19
-rw-r--r--glsa-200510-15.xml13
-rw-r--r--glsa-200510-16.xml17
-rw-r--r--glsa-200510-17.xml17
-rw-r--r--glsa-200510-18.xml11
-rw-r--r--glsa-200510-19.xml13
-rw-r--r--glsa-200510-20.xml13
-rw-r--r--glsa-200510-21.xml17
-rw-r--r--glsa-200510-22.xml15
-rw-r--r--glsa-200510-23.xml13
-rw-r--r--glsa-200510-24.xml23
-rw-r--r--glsa-200510-25.xml33
-rw-r--r--glsa-200510-26.xml17
-rw-r--r--glsa-200511-01.xml15
-rw-r--r--glsa-200511-02.xml19
-rw-r--r--glsa-200511-03.xml17
-rw-r--r--glsa-200511-04.xml27
-rw-r--r--glsa-200511-05.xml19
-rw-r--r--glsa-200511-06.xml13
-rw-r--r--glsa-200511-07.xml19
-rw-r--r--glsa-200511-08.xml23
-rw-r--r--glsa-200511-09.xml15
-rw-r--r--glsa-200511-10.xml15
-rw-r--r--glsa-200511-11.xml15
-rw-r--r--glsa-200511-12.xml17
-rw-r--r--glsa-200511-13.xml17
-rw-r--r--glsa-200511-14.xml17
-rw-r--r--glsa-200511-15.xml15
-rw-r--r--glsa-200511-16.xml19
-rw-r--r--glsa-200511-17.xml15
-rw-r--r--glsa-200511-18.xml19
-rw-r--r--glsa-200511-19.xml13
-rw-r--r--glsa-200511-20.xml17
-rw-r--r--glsa-200511-21.xml15
-rw-r--r--glsa-200511-22.xml15
-rw-r--r--glsa-200511-23.xml17
-rw-r--r--glsa-200512-01.xml15
-rw-r--r--glsa-200512-02.xml19
-rw-r--r--glsa-200512-03.xml23
-rw-r--r--glsa-200512-04.xml17
-rw-r--r--glsa-200512-05.xml15
-rw-r--r--glsa-200512-06.xml13
-rw-r--r--glsa-200512-07.xml15
-rw-r--r--glsa-200512-08.xml23
-rw-r--r--glsa-200512-09.xml17
-rw-r--r--glsa-200512-10.xml17
-rw-r--r--glsa-200512-11.xml17
-rw-r--r--glsa-200512-12.xml23
-rw-r--r--glsa-200512-13.xml15
-rw-r--r--glsa-200512-14.xml13
-rw-r--r--glsa-200512-15.xml15
-rw-r--r--glsa-200512-16.xml11
-rw-r--r--glsa-200512-17.xml15
-rw-r--r--glsa-200512-18.xml13
-rw-r--r--glsa-200601-01.xml15
-rw-r--r--glsa-200601-02.xml37
-rw-r--r--glsa-200601-03.xml17
-rw-r--r--glsa-200601-04.xml16
-rw-r--r--glsa-200601-05.xml15
-rw-r--r--glsa-200601-06.xml19
-rw-r--r--glsa-200601-07.xml15
-rw-r--r--glsa-200601-08.xml15
-rw-r--r--glsa-200601-09.xml15
-rw-r--r--glsa-200601-10.xml21
-rw-r--r--glsa-200601-11.xml13
-rw-r--r--glsa-200601-12.xml15
-rw-r--r--glsa-200601-13.xml15
-rw-r--r--glsa-200601-14.xml15
-rw-r--r--glsa-200601-15.xml13
-rw-r--r--glsa-200601-16.xml15
-rw-r--r--glsa-200601-17.xml27
-rw-r--r--glsa-200602-01.xml17
-rw-r--r--glsa-200602-02.xml13
-rw-r--r--glsa-200602-03.xml23
-rw-r--r--glsa-200602-04.xml15
-rw-r--r--glsa-200602-05.xml17
-rw-r--r--glsa-200602-06.xml17
-rw-r--r--glsa-200602-07.xml21
-rw-r--r--glsa-200602-08.xml17
-rw-r--r--glsa-200602-09.xml15
-rw-r--r--glsa-200602-10.xml13
-rw-r--r--glsa-200602-11.xml17
-rw-r--r--glsa-200602-12.xml15
-rw-r--r--glsa-200602-13.xml17
-rw-r--r--glsa-200602-14.xml15
-rw-r--r--glsa-200603-01.xml13
-rw-r--r--glsa-200603-02.xml21
-rw-r--r--glsa-200603-03.xml17
-rw-r--r--glsa-200603-04.xml15
-rw-r--r--glsa-200603-05.xml15
-rw-r--r--glsa-200603-06.xml15
-rw-r--r--glsa-200603-07.xml15
-rw-r--r--glsa-200603-08.xml13
-rw-r--r--glsa-200603-09.xml17
-rw-r--r--glsa-200603-10.xml15
-rw-r--r--glsa-200603-11.xml13
-rw-r--r--glsa-200603-12.xml15
-rw-r--r--glsa-200603-13.xml15
-rw-r--r--glsa-200603-14.xml17
-rw-r--r--glsa-200603-15.xml15
-rw-r--r--glsa-200603-16.xml15
-rw-r--r--glsa-200603-17.xml15
-rw-r--r--glsa-200603-18.xml17
-rw-r--r--glsa-200603-19.xml17
-rw-r--r--glsa-200603-20.xml13
-rw-r--r--glsa-200603-21.xml15
-rw-r--r--glsa-200603-22.xml23
-rw-r--r--glsa-200603-23.xml19
-rw-r--r--glsa-200603-24.xml15
-rw-r--r--glsa-200603-25.xml21
-rw-r--r--glsa-200603-26.xml15
-rw-r--r--glsa-200604-01.xml17
-rw-r--r--glsa-200604-02.xml19
-rw-r--r--glsa-200604-03.xml17
-rw-r--r--glsa-200604-04.xml17
-rw-r--r--glsa-200604-05.xml15
-rw-r--r--glsa-200604-06.xml17
-rw-r--r--glsa-200604-07.xml21
-rw-r--r--glsa-200604-08.xml17
-rw-r--r--glsa-200604-09.xml15
-rw-r--r--glsa-200604-10.xml19
-rw-r--r--glsa-200604-11.xml15
-rw-r--r--glsa-200604-12.xml59
-rw-r--r--glsa-200604-13.xml15
-rw-r--r--glsa-200604-14.xml15
-rw-r--r--glsa-200604-15.xml15
-rw-r--r--glsa-200604-16.xml15
-rw-r--r--glsa-200604-17.xml29
-rw-r--r--glsa-200604-18.xml67
-rw-r--r--glsa-200605-01.xml17
-rw-r--r--glsa-200605-02.xml13
-rw-r--r--glsa-200605-03.xml13
-rw-r--r--glsa-200605-04.xml15
-rw-r--r--glsa-200605-05.xml15
-rw-r--r--glsa-200605-06.xml17
-rw-r--r--glsa-200605-07.xml17
-rw-r--r--glsa-200605-08.xml19
-rw-r--r--glsa-200605-09.xml57
-rw-r--r--glsa-200605-10.xml15
-rw-r--r--glsa-200605-11.xml15
-rw-r--r--glsa-200605-12.xml19
-rw-r--r--glsa-200605-13.xml17
-rw-r--r--glsa-200605-14.xml15
-rw-r--r--glsa-200605-15.xml19
-rw-r--r--glsa-200605-16.xml15
-rw-r--r--glsa-200605-17.xml19
-rw-r--r--glsa-200606-01.xml13
-rw-r--r--glsa-200606-02.xml15
-rw-r--r--glsa-200606-03.xml17
-rw-r--r--glsa-200606-04.xml15
-rw-r--r--glsa-200606-05.xml13
-rw-r--r--glsa-200606-06.xml17
-rw-r--r--glsa-200606-07.xml15
-rw-r--r--glsa-200606-08.xml15
-rw-r--r--glsa-200606-09.xml13
-rw-r--r--glsa-200606-10.xml15
-rw-r--r--glsa-200606-11.xml15
-rw-r--r--glsa-200606-12.xml39
-rw-r--r--glsa-200606-13.xml15
-rw-r--r--glsa-200606-14.xml17
-rw-r--r--glsa-200606-15.xml17
-rw-r--r--glsa-200606-16.xml17
-rw-r--r--glsa-200606-17.xml15
-rw-r--r--glsa-200606-18.xml19
-rw-r--r--glsa-200606-19.xml15
-rw-r--r--glsa-200606-20.xml15
-rw-r--r--glsa-200606-21.xml33
-rw-r--r--glsa-200606-22.xml11
-rw-r--r--glsa-200606-23.xml13
-rw-r--r--glsa-200606-24.xml15
-rw-r--r--glsa-200606-25.xml15
-rw-r--r--glsa-200606-26.xml15
-rw-r--r--glsa-200606-27.xml15
-rw-r--r--glsa-200606-28.xml13
-rw-r--r--glsa-200606-29.xml15
-rw-r--r--glsa-200606-30.xml15
-rw-r--r--glsa-200607-01.xml15
-rw-r--r--glsa-200607-02.xml15
-rw-r--r--glsa-200607-03.xml15
-rw-r--r--glsa-200607-04.xml17
-rw-r--r--glsa-200607-05.xml21
-rw-r--r--glsa-200607-06.xml19
-rw-r--r--glsa-200607-07.xml15
-rw-r--r--glsa-200607-08.xml15
-rw-r--r--glsa-200607-09.xml29
-rw-r--r--glsa-200607-10.xml15
-rw-r--r--glsa-200607-11.xml13
-rw-r--r--glsa-200607-12.xml19
-rw-r--r--glsa-200607-13.xml17
-rw-r--r--glsa-200608-01.xml17
-rw-r--r--glsa-200608-02.xml41
-rw-r--r--glsa-200608-03.xml39
-rw-r--r--glsa-200608-04.xml37
-rw-r--r--glsa-200608-05.xml15
-rw-r--r--glsa-200608-06.xml15
-rw-r--r--glsa-200608-07.xml25
-rw-r--r--glsa-200608-08.xml15
-rw-r--r--glsa-200608-09.xml15
-rw-r--r--glsa-200608-10.xml17
-rw-r--r--glsa-200608-11.xml15
-rw-r--r--glsa-200608-12.xml17
-rw-r--r--glsa-200608-13.xml15
-rw-r--r--glsa-200608-14.xml15
-rw-r--r--glsa-200608-15.xml17
-rw-r--r--glsa-200608-16.xml15
-rw-r--r--glsa-200608-17.xml15
-rw-r--r--glsa-200608-18.xml15
-rw-r--r--glsa-200608-19.xml19
-rw-r--r--glsa-200608-20.xml17
-rw-r--r--glsa-200608-21.xml19
-rw-r--r--glsa-200608-22.xml15
-rw-r--r--glsa-200608-23.xml15
-rw-r--r--glsa-200608-24.xml15
-rw-r--r--glsa-200608-25.xml35
-rw-r--r--glsa-200608-26.xml25
-rw-r--r--glsa-200608-27.xml17
-rw-r--r--glsa-200608-28.xml17
-rw-r--r--glsa-200609-01.xml15
-rw-r--r--glsa-200609-02.xml15
-rw-r--r--glsa-200609-03.xml17
-rw-r--r--glsa-200609-04.xml15
-rw-r--r--glsa-200609-05.xml17
-rw-r--r--glsa-200609-06.xml17
-rw-r--r--glsa-200609-07.xml17
-rw-r--r--glsa-200609-08.xml15
-rw-r--r--glsa-200609-09.xml15
-rw-r--r--glsa-200609-10.xml17
-rw-r--r--glsa-200609-11.xml19
-rw-r--r--glsa-200609-12.xml17
-rw-r--r--glsa-200609-13.xml21
-rw-r--r--glsa-200609-14.xml19
-rw-r--r--glsa-200609-15.xml15
-rw-r--r--glsa-200609-16.xml17
-rw-r--r--glsa-200609-17.xml13
-rw-r--r--glsa-200609-18.xml17
-rw-r--r--glsa-200609-19.xml29
-rw-r--r--glsa-200609-20.xml19
-rw-r--r--glsa-200610-01.xml29
-rw-r--r--glsa-200610-02.xml21
-rw-r--r--glsa-200610-03.xml15
-rw-r--r--glsa-200610-04.xml23
-rw-r--r--glsa-200610-05.xml15
-rw-r--r--glsa-200610-06.xml17
-rw-r--r--glsa-200610-07.xml15
-rw-r--r--glsa-200610-08.xml13
-rw-r--r--glsa-200610-09.xml15
-rw-r--r--glsa-200610-10.xml15
-rw-r--r--glsa-200610-11.xml23
-rw-r--r--glsa-200610-12.xml15
-rw-r--r--glsa-200610-13.xml15
-rw-r--r--glsa-200610-14.xml17
-rw-r--r--glsa-200610-15.xml19
-rw-r--r--glsa-200611-01.xml13
-rw-r--r--glsa-200611-02.xml17
-rw-r--r--glsa-200611-03.xml17
-rw-r--r--glsa-200611-04.xml19
-rw-r--r--glsa-200611-05.xml13
-rw-r--r--glsa-200611-06.xml19
-rw-r--r--glsa-200611-07.xml15
-rw-r--r--glsa-200611-08.xml15
-rw-r--r--glsa-200611-09.xml13
-rw-r--r--glsa-200611-10.xml17
-rw-r--r--glsa-200611-11.xml17
-rw-r--r--glsa-200611-12.xml13
-rw-r--r--glsa-200611-13.xml17
-rw-r--r--glsa-200611-14.xml15
-rw-r--r--glsa-200611-15.xml15
-rw-r--r--glsa-200611-16.xml15
-rw-r--r--glsa-200611-17.xml15
-rw-r--r--glsa-200611-18.xml15
-rw-r--r--glsa-200611-19.xml15
-rw-r--r--glsa-200611-20.xml15
-rw-r--r--glsa-200611-21.xml13
-rw-r--r--glsa-200611-22.xml15
-rw-r--r--glsa-200611-23.xml15
-rw-r--r--glsa-200611-24.xml21
-rw-r--r--glsa-200611-25.xml15
-rw-r--r--glsa-200611-26.xml19
-rw-r--r--glsa-200612-01.xml13
-rw-r--r--glsa-200612-02.xml15
-rw-r--r--glsa-200612-03.xml17
-rw-r--r--glsa-200612-04.xml15
-rw-r--r--glsa-200612-05.xml15
-rw-r--r--glsa-200612-06.xml29
-rw-r--r--glsa-200612-07.xml25
-rw-r--r--glsa-200612-08.xml23
-rw-r--r--glsa-200612-09.xml15
-rw-r--r--glsa-200612-10.xml15
-rw-r--r--glsa-200612-11.xml19
-rw-r--r--glsa-200612-12.xml19
-rw-r--r--glsa-200612-13.xml15
-rw-r--r--glsa-200612-14.xml17
-rw-r--r--glsa-200612-15.xml13
-rw-r--r--glsa-200612-16.xml15
-rw-r--r--glsa-200612-17.xml15
-rw-r--r--glsa-200612-18.xml13
-rw-r--r--glsa-200612-19.xml13
-rw-r--r--glsa-200612-20.xml21
-rw-r--r--glsa-200612-21.xml13
-rw-r--r--glsa-200701-01.xml13
-rw-r--r--glsa-200701-02.xml33
-rw-r--r--glsa-200701-03.xml25
-rw-r--r--glsa-200701-04.xml29
-rw-r--r--glsa-200701-05.xml15
-rw-r--r--glsa-200701-06.xml13
-rw-r--r--glsa-200701-07.xml17
-rw-r--r--glsa-200701-08.xml21
-rw-r--r--glsa-200701-09.xml13
-rw-r--r--glsa-200701-10.xml19
-rw-r--r--glsa-200701-11.xml15
-rw-r--r--glsa-200701-12.xml15
-rw-r--r--glsa-200701-13.xml17
-rw-r--r--glsa-200701-14.xml15
-rw-r--r--glsa-200701-15.xml23
-rw-r--r--glsa-200701-16.xml23
-rw-r--r--glsa-200701-17.xml15
-rw-r--r--glsa-200701-18.xml15
-rw-r--r--glsa-200701-19.xml15
-rw-r--r--glsa-200701-20.xml15
-rw-r--r--glsa-200701-21.xml17
-rw-r--r--glsa-200701-22.xml17
-rw-r--r--glsa-200701-23.xml15
-rw-r--r--glsa-200701-24.xml15
-rw-r--r--glsa-200701-25.xml17
-rw-r--r--glsa-200701-26.xml15
-rw-r--r--glsa-200701-27.xml13
-rw-r--r--glsa-200701-28.xml15
-rw-r--r--glsa-200702-01.xml17
-rw-r--r--glsa-200702-02.xml15
-rw-r--r--glsa-200702-03.xml15
-rw-r--r--glsa-200702-04.xml17
-rw-r--r--glsa-200702-05.xml15
-rw-r--r--glsa-200702-06.xml19
-rw-r--r--glsa-200702-07.xml21
-rw-r--r--glsa-200702-08.xml23
-rw-r--r--glsa-200702-09.xml17
-rw-r--r--glsa-200702-10.xml23
-rw-r--r--glsa-200702-11.xml15
-rw-r--r--glsa-200702-12.xml15
-rw-r--r--glsa-200703-01.xml13
-rw-r--r--glsa-200703-02.xml15
-rw-r--r--glsa-200703-03.xml17
-rw-r--r--glsa-200703-04.xml41
-rw-r--r--glsa-200703-05.xml17
-rw-r--r--glsa-200703-06.xml17
-rw-r--r--glsa-200703-07.xml15
-rw-r--r--glsa-200703-08.xml35
-rw-r--r--glsa-200703-09.xml21
-rw-r--r--glsa-200703-10.xml15
-rw-r--r--glsa-200703-11.xml15
-rw-r--r--glsa-200703-12.xml13
-rw-r--r--glsa-200703-13.xml13
-rw-r--r--glsa-200703-14.xml11
-rw-r--r--glsa-200703-15.xml17
-rw-r--r--glsa-200703-16.xml15
-rw-r--r--glsa-200703-17.xml15
-rw-r--r--glsa-200703-18.xml25
-rw-r--r--glsa-200703-19.xml17
-rw-r--r--glsa-200703-20.xml15
-rw-r--r--glsa-200703-21.xml43
-rw-r--r--glsa-200703-22.xml15
-rw-r--r--glsa-200703-23.xml23
-rw-r--r--glsa-200703-24.xml17
-rw-r--r--glsa-200703-25.xml15
-rw-r--r--glsa-200703-26.xml15
-rw-r--r--glsa-200703-27.xml15
-rw-r--r--glsa-200703-28.xml15
-rw-r--r--glsa-200704-01.xml13
-rw-r--r--glsa-200704-02.xml17
-rw-r--r--glsa-200704-03.xml15
-rw-r--r--glsa-200704-04.xml13
-rw-r--r--glsa-200704-05.xml15
-rw-r--r--glsa-200704-06.xml17
-rw-r--r--glsa-200704-07.xml17
-rw-r--r--glsa-200704-08.xml15
-rw-r--r--glsa-200704-09.xml15
-rw-r--r--glsa-200704-10.xml15
-rw-r--r--glsa-200704-11.xml15
-rw-r--r--glsa-200704-12.xml23
-rw-r--r--glsa-200704-13.xml15
-rw-r--r--glsa-200704-14.xml15
-rw-r--r--glsa-200704-15.xml17
-rw-r--r--glsa-200704-16.xml15
-rw-r--r--glsa-200704-17.xml15
-rw-r--r--glsa-200704-18.xml13
-rw-r--r--glsa-200704-19.xml15
-rw-r--r--glsa-200704-20.xml23
-rw-r--r--glsa-200704-21.xml17
-rw-r--r--glsa-200704-22.xml17
-rw-r--r--glsa-200704-23.xml15
-rw-r--r--glsa-200705-01.xml19
-rw-r--r--glsa-200705-02.xml15
-rw-r--r--glsa-200705-03.xml15
-rw-r--r--glsa-200705-04.xml17
-rw-r--r--glsa-200705-05.xml15
-rw-r--r--glsa-200705-06.xml15
-rw-r--r--glsa-200705-07.xml17
-rw-r--r--glsa-200705-08.xml13
-rw-r--r--glsa-200705-09.xml15
-rw-r--r--glsa-200705-10.xml21
-rw-r--r--glsa-200705-11.xml17
-rw-r--r--glsa-200705-12.xml18
-rw-r--r--glsa-200705-13.xml15
-rw-r--r--glsa-200705-14.xml15
-rw-r--r--glsa-200705-15.xml17
-rw-r--r--glsa-200705-16.xml17
-rw-r--r--glsa-200705-17.xml15
-rw-r--r--glsa-200705-18.xml15
-rw-r--r--glsa-200705-19.xml47
-rw-r--r--glsa-200705-20.xml23
-rw-r--r--glsa-200705-21.xml19
-rw-r--r--glsa-200705-22.xml15
-rw-r--r--glsa-200705-23.xml21
-rw-r--r--glsa-200705-24.xml15
-rw-r--r--glsa-200705-25.xml13
-rw-r--r--glsa-200706-01.xml13
-rw-r--r--glsa-200706-02.xml15
-rw-r--r--glsa-200706-03.xml15
-rw-r--r--glsa-200706-04.xml19
-rw-r--r--glsa-200706-05.xml23
-rw-r--r--glsa-200706-06.xml39
-rw-r--r--glsa-200706-07.xml21
-rw-r--r--glsa-200706-08.xml19
-rw-r--r--glsa-200706-09.xml15
-rw-r--r--glsa-200707-01.xml13
-rw-r--r--glsa-200707-02.xml19
-rw-r--r--glsa-200707-03.xml15
-rw-r--r--glsa-200707-04.xml13
-rw-r--r--glsa-200707-05.xml15
-rw-r--r--glsa-200707-06.xml13
-rw-r--r--glsa-200707-07.xml15
-rw-r--r--glsa-200707-08.xml15
-rw-r--r--glsa-200707-09.xml17
-rw-r--r--glsa-200707-10.xml11
-rw-r--r--glsa-200707-11.xml19
-rw-r--r--glsa-200707-12.xml15
-rw-r--r--glsa-200707-13.xml15
-rw-r--r--glsa-200707-14.xml15
-rw-r--r--glsa-200708-01.xml19
-rw-r--r--glsa-200708-02.xml15
-rw-r--r--glsa-200708-03.xml19
-rw-r--r--glsa-200708-04.xml15
-rw-r--r--glsa-200708-05.xml29
-rw-r--r--glsa-200708-06.xml17
-rw-r--r--glsa-200708-07.xml15
-rw-r--r--glsa-200708-08.xml17
-rw-r--r--glsa-200708-09.xml41
-rw-r--r--glsa-200708-10.xml17
-rw-r--r--glsa-200708-11.xml23
-rw-r--r--glsa-200708-12.xml23
-rw-r--r--glsa-200708-13.xml17
-rw-r--r--glsa-200708-14.xml15
-rw-r--r--glsa-200708-15.xml15
-rw-r--r--glsa-200708-16.xml15
-rw-r--r--glsa-200708-17.xml23
-rw-r--r--glsa-200709-01.xml17
-rw-r--r--glsa-200709-02.xml15
-rw-r--r--glsa-200709-03.xml15
-rw-r--r--glsa-200709-04.xml15
-rw-r--r--glsa-200709-05.xml15
-rw-r--r--glsa-200709-06.xml15
-rw-r--r--glsa-200709-07.xml15
-rw-r--r--glsa-200709-08.xml13
-rw-r--r--glsa-200709-09.xml13
-rw-r--r--glsa-200709-10.xml15
-rw-r--r--glsa-200709-11.xml15
-rw-r--r--glsa-200709-12.xml15
-rw-r--r--glsa-200709-13.xml15
-rw-r--r--glsa-200709-14.xml15
-rw-r--r--glsa-200709-15.xml29
-rw-r--r--glsa-200709-16.xml15
-rw-r--r--glsa-200709-17.xml19
-rw-r--r--glsa-200709-18.xml17
-rw-r--r--glsa-200710-01.xml17
-rw-r--r--glsa-200710-02.xml69
-rw-r--r--glsa-200710-03.xml21
-rw-r--r--glsa-200710-04.xml15
-rw-r--r--glsa-200710-05.xml15
-rw-r--r--glsa-200710-06.xml19
-rw-r--r--glsa-200710-07.xml15
-rw-r--r--glsa-200710-08.xml21
-rw-r--r--glsa-200710-09.xml19
-rw-r--r--glsa-200710-10.xml15
-rw-r--r--glsa-200710-11.xml19
-rw-r--r--glsa-200710-12.xml15
-rw-r--r--glsa-200710-13.xml17
-rw-r--r--glsa-200710-14.xml15
-rw-r--r--glsa-200710-15.xml17
-rw-r--r--glsa-200710-16.xml15
-rw-r--r--glsa-200710-17.xml15
-rw-r--r--glsa-200710-18.xml15
-rw-r--r--glsa-200710-19.xml21
-rw-r--r--glsa-200710-20.xml15
-rw-r--r--glsa-200710-21.xml15
-rw-r--r--glsa-200710-22.xml15
-rw-r--r--glsa-200710-23.xml15
-rw-r--r--glsa-200710-24.xml17
-rw-r--r--glsa-200710-25.xml13
-rw-r--r--glsa-200710-26.xml15
-rw-r--r--glsa-200710-27.xml21
-rw-r--r--glsa-200710-28.xml15
-rw-r--r--glsa-200710-29.xml17
-rw-r--r--glsa-200710-30.xml15
-rw-r--r--glsa-200710-31.xml15
-rw-r--r--glsa-200711-01.xml17
-rw-r--r--glsa-200711-02.xml15
-rw-r--r--glsa-200711-03.xml15
-rw-r--r--glsa-200711-04.xml17
-rw-r--r--glsa-200711-05.xml23
-rw-r--r--glsa-200711-06.xml25
-rw-r--r--glsa-200711-07.xml17
-rw-r--r--glsa-200711-08.xml19
-rw-r--r--glsa-200711-09.xml15
-rw-r--r--glsa-200711-10.xml13
-rw-r--r--glsa-200711-11.xml17
-rw-r--r--glsa-200711-12.xml15
-rw-r--r--glsa-200711-13.xml19
-rw-r--r--glsa-200711-14.xml37
-rw-r--r--glsa-200711-15.xml15
-rw-r--r--glsa-200711-16.xml13
-rw-r--r--glsa-200711-17.xml19
-rw-r--r--glsa-200711-18.xml15
-rw-r--r--glsa-200711-19.xml19
-rw-r--r--glsa-200711-20.xml17
-rw-r--r--glsa-200711-21.xml17
-rw-r--r--glsa-200711-22.xml25
-rw-r--r--glsa-200711-23.xml49
-rw-r--r--glsa-200711-24.xml21
-rw-r--r--glsa-200711-25.xml15
-rw-r--r--glsa-200711-26.xml21
-rw-r--r--glsa-200711-27.xml15
-rw-r--r--glsa-200711-28.xml15
-rw-r--r--glsa-200711-29.xml15
-rw-r--r--glsa-200711-30.xml33
-rw-r--r--glsa-200711-31.xml15
-rw-r--r--glsa-200711-32.xml15
-rw-r--r--glsa-200711-33.xml15
-rw-r--r--glsa-200711-34.xml21
-rw-r--r--glsa-200712-01.xml13
-rw-r--r--glsa-200712-02.xml15
-rw-r--r--glsa-200712-03.xml17
-rw-r--r--glsa-200712-04.xml15
-rw-r--r--glsa-200712-05.xml15
-rw-r--r--glsa-200712-06.xml17
-rw-r--r--glsa-200712-07.xml15
-rw-r--r--glsa-200712-08.xml17
-rw-r--r--glsa-200712-09.xml15
-rw-r--r--glsa-200712-10.xml13
-rw-r--r--glsa-200712-11.xml15
-rw-r--r--glsa-200712-12.xml15
-rw-r--r--glsa-200712-13.xml15
-rw-r--r--glsa-200712-14.xml21
-rw-r--r--glsa-200712-15.xml17
-rw-r--r--glsa-200712-16.xml15
-rw-r--r--glsa-200712-17.xml19
-rw-r--r--glsa-200712-18.xml17
-rw-r--r--glsa-200712-19.xml15
-rw-r--r--glsa-200712-20.xml17
-rw-r--r--glsa-200712-21.xml25
-rw-r--r--glsa-200712-22.xml21
-rw-r--r--glsa-200712-23.xml45
-rw-r--r--glsa-200712-24.xml15
-rw-r--r--glsa-200712-25.xml19
-rw-r--r--glsa-200801-01.xml15
-rw-r--r--glsa-200801-02.xml15
-rw-r--r--glsa-200801-03.xml15
-rw-r--r--glsa-200801-04.xml15
-rw-r--r--glsa-200801-05.xml15
-rw-r--r--glsa-200801-06.xml19
-rw-r--r--glsa-200801-07.xml31
-rw-r--r--glsa-200801-08.xml15
-rw-r--r--glsa-200801-09.xml27
-rw-r--r--glsa-200801-10.xml19
-rw-r--r--glsa-200801-11.xml17
-rw-r--r--glsa-200801-12.xml17
-rw-r--r--glsa-200801-13.xml15
-rw-r--r--glsa-200801-14.xml13
-rw-r--r--glsa-200801-15.xml25
-rw-r--r--glsa-200801-16.xml15
-rw-r--r--glsa-200801-17.xml15
-rw-r--r--glsa-200801-18.xml15
-rw-r--r--glsa-200801-19.xml17
-rw-r--r--glsa-200801-20.xml15
-rw-r--r--glsa-200801-21.xml15
-rw-r--r--glsa-200801-22.xml15
-rw-r--r--glsa-200802-01.xml17
-rw-r--r--glsa-200802-02.xml17
-rw-r--r--glsa-200802-03.xml13
-rw-r--r--glsa-200802-04.xml31
-rw-r--r--glsa-200802-05.xml15
-rw-r--r--glsa-200802-06.xml17
-rw-r--r--glsa-200802-07.xml15
-rw-r--r--glsa-200802-08.xml17
-rw-r--r--glsa-200802-09.xml17
-rw-r--r--glsa-200802-10.xml17
-rw-r--r--glsa-200802-11.xml21
-rw-r--r--glsa-200802-12.xml19
-rw-r--r--glsa-200803-01.xml27
-rw-r--r--glsa-200803-02.xml17
-rw-r--r--glsa-200803-03.xml15
-rw-r--r--glsa-200803-04.xml15
-rw-r--r--glsa-200803-05.xml15
-rw-r--r--glsa-200803-06.xml15
-rw-r--r--glsa-200803-07.xml15
-rw-r--r--glsa-200803-08.xml29
-rw-r--r--glsa-200803-09.xml19
-rw-r--r--glsa-200803-10.xml17
-rw-r--r--glsa-200803-11.xml15
-rw-r--r--glsa-200803-12.xml15
-rw-r--r--glsa-200803-13.xml25
-rw-r--r--glsa-200803-14.xml19
-rw-r--r--glsa-200803-15.xml15
-rw-r--r--glsa-200803-16.xml21
-rw-r--r--glsa-200803-17.xml15
-rw-r--r--glsa-200803-18.xml21
-rw-r--r--glsa-200803-19.xml23
-rw-r--r--glsa-200803-20.xml17
-rw-r--r--glsa-200803-21.xml17
-rw-r--r--glsa-200803-22.xml15
-rw-r--r--glsa-200803-23.xml17
-rw-r--r--glsa-200803-24.xml17
-rw-r--r--glsa-200803-25.xml17
-rw-r--r--glsa-200803-26.xml15
-rw-r--r--glsa-200803-27.xml23
-rw-r--r--glsa-200803-28.xml17
-rw-r--r--glsa-200803-29.xml19
-rw-r--r--glsa-200803-30.xml33
-rw-r--r--glsa-200803-31.xml23
-rw-r--r--glsa-200803-32.xml19
-rw-r--r--glsa-200804-01.xml21
-rw-r--r--glsa-200804-02.xml15
-rw-r--r--glsa-200804-03.xml17
-rw-r--r--glsa-200804-04.xml19
-rw-r--r--glsa-200804-05.xml17
-rw-r--r--glsa-200804-06.xml15
-rw-r--r--glsa-200804-07.xml15
-rw-r--r--glsa-200804-08.xml17
-rw-r--r--glsa-200804-09.xml15
-rw-r--r--glsa-200804-10.xml25
-rw-r--r--glsa-200804-11.xml15
-rw-r--r--glsa-200804-12.xml15
-rw-r--r--glsa-200804-13.xml19
-rw-r--r--glsa-200804-14.xml17
-rw-r--r--glsa-200804-15.xml15
-rw-r--r--glsa-200804-16.xml15
-rw-r--r--glsa-200804-17.xml15
-rw-r--r--glsa-200804-18.xml13
-rw-r--r--glsa-200804-19.xml15
-rw-r--r--glsa-200804-20.xml85
-rw-r--r--glsa-200804-21.xml27
-rw-r--r--glsa-200804-22.xml17
-rw-r--r--glsa-200804-23.xml15
-rw-r--r--glsa-200804-24.xml15
-rw-r--r--glsa-200804-25.xml27
-rw-r--r--glsa-200804-26.xml15
-rw-r--r--glsa-200804-27.xml23
-rw-r--r--glsa-200804-28.xml17
-rw-r--r--glsa-200804-29.xml17
-rw-r--r--glsa-200804-30.xml13
-rw-r--r--glsa-200805-01.xml25
-rw-r--r--glsa-200805-02.xml15
-rw-r--r--glsa-200805-03.xml29
-rw-r--r--glsa-200805-04.xml17
-rw-r--r--glsa-200805-05.xml19
-rw-r--r--glsa-200805-06.xml13
-rw-r--r--glsa-200805-07.xml29
-rw-r--r--glsa-200805-08.xml15
-rw-r--r--glsa-200805-09.xml15
-rw-r--r--glsa-200805-10.xml17
-rw-r--r--glsa-200805-11.xml15
-rw-r--r--glsa-200805-12.xml17
-rw-r--r--glsa-200805-13.xml25
-rw-r--r--glsa-200805-14.xml15
-rw-r--r--glsa-200805-15.xml15
-rw-r--r--glsa-200805-16.xml29
-rw-r--r--glsa-200805-17.xml17
-rw-r--r--glsa-200805-18.xml71
-rw-r--r--glsa-200805-19.xml25
-rw-r--r--glsa-200805-20.xml17
-rw-r--r--glsa-200805-21.xml17
-rw-r--r--glsa-200805-22.xml15
-rw-r--r--glsa-200805-23.xml15
-rw-r--r--glsa-200806-01.xml15
-rw-r--r--glsa-200806-02.xml15
-rw-r--r--glsa-200806-03.xml15
-rw-r--r--glsa-200806-04.xml19
-rw-r--r--glsa-200806-05.xml15
-rw-r--r--glsa-200806-06.xml17
-rw-r--r--glsa-200806-07.xml33
-rw-r--r--glsa-200806-08.xml17
-rw-r--r--glsa-200806-09.xml19
-rw-r--r--glsa-200806-10.xml19
-rw-r--r--glsa-200806-11.xml21
-rw-r--r--glsa-200807-01.xml19
-rw-r--r--glsa-200807-02.xml15
-rw-r--r--glsa-200807-03.xml15
-rw-r--r--glsa-200807-04.xml13
-rw-r--r--glsa-200807-05.xml17
-rw-r--r--glsa-200807-06.xml19
-rw-r--r--glsa-200807-07.xml15
-rw-r--r--glsa-200807-08.xml15
-rw-r--r--glsa-200807-09.xml15
-rw-r--r--glsa-200807-10.xml13
-rw-r--r--glsa-200807-11.xml15
-rw-r--r--glsa-200807-12.xml17
-rw-r--r--glsa-200807-13.xml17
-rw-r--r--glsa-200807-14.xml13
-rw-r--r--glsa-200807-15.xml15
-rw-r--r--glsa-200807-16.xml23
-rw-r--r--glsa-200808-01.xml19
-rw-r--r--glsa-200808-02.xml17
-rw-r--r--glsa-200808-03.xml59
-rw-r--r--glsa-200808-04.xml25
-rw-r--r--glsa-200808-05.xml15
-rw-r--r--glsa-200808-06.xml15
-rw-r--r--glsa-200808-07.xml19
-rw-r--r--glsa-200808-08.xml15
-rw-r--r--glsa-200808-09.xml13
-rw-r--r--glsa-200808-10.xml13
-rw-r--r--glsa-200808-11.xml17
-rw-r--r--glsa-200808-12.xml17
-rw-r--r--glsa-200809-01.xml17
-rw-r--r--glsa-200809-02.xml17
-rw-r--r--glsa-200809-03.xml13
-rw-r--r--glsa-200809-04.xml13
-rw-r--r--glsa-200809-05.xml15
-rw-r--r--glsa-200809-06.xml17
-rw-r--r--glsa-200809-07.xml15
-rw-r--r--glsa-200809-08.xml15
-rw-r--r--glsa-200809-09.xml17
-rw-r--r--glsa-200809-10.xml21
-rw-r--r--glsa-200809-11.xml15
-rw-r--r--glsa-200809-12.xml15
-rw-r--r--glsa-200809-13.xml15
-rw-r--r--glsa-200809-14.xml17
-rw-r--r--glsa-200809-15.xml15
-rw-r--r--glsa-200809-16.xml15
-rw-r--r--glsa-200809-17.xml21
-rw-r--r--glsa-200809-18.xml21
-rw-r--r--glsa-200810-01.xml17
-rw-r--r--glsa-200810-02.xml13
-rw-r--r--glsa-200810-03.xml15
-rw-r--r--glsa-200811-01.xml39
-rw-r--r--glsa-200811-02.xml23
-rw-r--r--glsa-200811-03.xml15
-rw-r--r--glsa-200811-04.xml15
-rw-r--r--glsa-200811-05.xml41
-rw-r--r--glsa-200812-01.xml15
-rw-r--r--glsa-200812-02.xml17
-rw-r--r--glsa-200812-03.xml17
-rw-r--r--glsa-200812-04.xml19
-rw-r--r--glsa-200812-05.xml15
-rw-r--r--glsa-200812-06.xml23
-rw-r--r--glsa-200812-07.xml21
-rw-r--r--glsa-200812-08.xml15
-rw-r--r--glsa-200812-09.xml15
-rw-r--r--glsa-200812-10.xml15
-rw-r--r--glsa-200812-11.xml19
-rw-r--r--glsa-200812-12.xml15
-rw-r--r--glsa-200812-13.xml21
-rw-r--r--glsa-200812-14.xml15
-rw-r--r--glsa-200812-15.xml25
-rw-r--r--glsa-200812-16.xml19
-rw-r--r--glsa-200812-17.xml37
-rw-r--r--glsa-200812-18.xml17
-rw-r--r--glsa-200812-19.xml17
-rw-r--r--glsa-200812-20.xml21
-rw-r--r--glsa-200812-21.xml17
-rw-r--r--glsa-200812-22.xml15
-rw-r--r--glsa-200812-23.xml15
-rw-r--r--glsa-200812-24.xml19
-rw-r--r--glsa-200901-01.xml15
-rw-r--r--glsa-200901-02.xml21
-rw-r--r--glsa-200901-03.xml17
-rw-r--r--glsa-200901-04.xml15
-rw-r--r--glsa-200901-05.xml15
-rw-r--r--glsa-200901-06.xml17
-rw-r--r--glsa-200901-07.xml19
-rw-r--r--glsa-200901-08.xml19
-rw-r--r--glsa-200901-09.xml27
-rw-r--r--glsa-200901-10.xml15
-rw-r--r--glsa-200901-11.xml15
-rw-r--r--glsa-200901-12.xml15
-rw-r--r--glsa-200901-13.xml21
-rw-r--r--glsa-200901-14.xml15
-rw-r--r--glsa-200901-15.xml15
-rw-r--r--glsa-200902-01.xml15
-rw-r--r--glsa-200902-02.xml15
-rw-r--r--glsa-200902-03.xml15
-rw-r--r--glsa-200902-04.xml15
-rw-r--r--glsa-200902-05.xml17
-rw-r--r--glsa-200902-06.xml19
-rw-r--r--glsa-200903-01.xml15
-rw-r--r--glsa-200903-02.xml15
-rw-r--r--glsa-200903-03.xml15
-rw-r--r--glsa-200903-04.xml15
-rw-r--r--glsa-200903-05.xml17
-rw-r--r--glsa-200903-06.xml15
-rw-r--r--glsa-200903-07.xml15
-rw-r--r--glsa-200903-08.xml15
-rw-r--r--glsa-200903-09.xml19
-rw-r--r--glsa-200903-10.xml15
-rw-r--r--glsa-200903-11.xml15
-rw-r--r--glsa-200903-12.xml15
-rw-r--r--glsa-200903-13.xml15
-rw-r--r--glsa-200903-14.xml17
-rw-r--r--glsa-200903-15.xml19
-rw-r--r--glsa-200903-16.xml15
-rw-r--r--glsa-200903-17.xml15
-rw-r--r--glsa-200903-18.xml15
-rw-r--r--glsa-200903-19.xml15
-rw-r--r--glsa-200903-20.xml19
-rw-r--r--glsa-200903-21.xml15
-rw-r--r--glsa-200903-22.xml15
-rw-r--r--glsa-200903-23.xml45
-rw-r--r--glsa-200903-24.xml15
-rw-r--r--glsa-200903-25.xml15
-rw-r--r--glsa-200903-26.xml15
-rw-r--r--glsa-200903-27.xml17
-rw-r--r--glsa-200903-28.xml19
-rw-r--r--glsa-200903-29.xml17
-rw-r--r--glsa-200903-30.xml27
-rw-r--r--glsa-200903-31.xml13
-rw-r--r--glsa-200903-32.xml25
-rw-r--r--glsa-200903-33.xml29
-rw-r--r--glsa-200903-34.xml17
-rw-r--r--glsa-200903-35.xml15
-rw-r--r--glsa-200903-36.xml15
-rw-r--r--glsa-200903-37.xml21
-rw-r--r--glsa-200903-38.xml21
-rw-r--r--glsa-200903-39.xml17
-rw-r--r--glsa-200903-40.xml17
-rw-r--r--glsa-200903-41.xml19
-rw-r--r--glsa-200904-01.xml23
-rw-r--r--glsa-200904-02.xml17
-rw-r--r--glsa-200904-03.xml13
-rw-r--r--glsa-200904-04.xml15
-rw-r--r--glsa-200904-05.xml17
-rw-r--r--glsa-200904-06.xml15
-rw-r--r--glsa-200904-07.xml15
-rw-r--r--glsa-200904-08.xml15
-rw-r--r--glsa-200904-09.xml19
-rw-r--r--glsa-200904-10.xml15
-rw-r--r--glsa-200904-11.xml27
-rw-r--r--glsa-200904-12.xml15
-rw-r--r--glsa-200904-13.xml13
-rw-r--r--glsa-200904-14.xml19
-rw-r--r--glsa-200904-15.xml15
-rw-r--r--glsa-200904-16.xml15
-rw-r--r--glsa-200904-17.xml25
-rw-r--r--glsa-200904-18.xml17
-rw-r--r--glsa-200904-19.xml21
-rw-r--r--glsa-200904-20.xml23
-rw-r--r--glsa-200905-01.xml27
-rw-r--r--glsa-200905-02.xml17
-rw-r--r--glsa-200905-03.xml17
-rw-r--r--glsa-200905-04.xml19
-rw-r--r--glsa-200905-05.xml15
-rw-r--r--glsa-200905-06.xml15
-rw-r--r--glsa-200905-07.xml21
-rw-r--r--glsa-200905-08.xml15
-rw-r--r--glsa-200905-09.xml17
-rw-r--r--glsa-200906-01.xml15
-rw-r--r--glsa-200906-02.xml13
-rw-r--r--glsa-200906-03.xml15
-rw-r--r--glsa-200906-04.xml15
-rw-r--r--glsa-200906-05.xml43
-rw-r--r--glsa-200907-01.xml15
-rw-r--r--glsa-200907-02.xml17
-rw-r--r--glsa-200907-03.xml19
-rw-r--r--glsa-200907-04.xml21
-rw-r--r--glsa-200907-05.xml15
-rw-r--r--glsa-200907-06.xml45
-rw-r--r--glsa-200907-07.xml21
-rw-r--r--glsa-200907-08.xml23
-rw-r--r--glsa-200907-09.xml15
-rw-r--r--glsa-200907-10.xml17
-rw-r--r--glsa-200907-11.xml27
-rw-r--r--glsa-200907-12.xml15
-rw-r--r--glsa-200907-13.xml15
-rw-r--r--glsa-200907-14.xml17
-rw-r--r--glsa-200907-15.xml21
-rw-r--r--glsa-200907-16.xml17
-rw-r--r--glsa-200908-01.xml17
-rw-r--r--glsa-200908-02.xml13
-rw-r--r--glsa-200908-03.xml17
-rw-r--r--glsa-200908-04.xml33
-rw-r--r--glsa-200908-05.xml15
-rw-r--r--glsa-200908-06.xml15
-rw-r--r--glsa-200908-07.xml19
-rw-r--r--glsa-200908-08.xml15
-rw-r--r--glsa-200908-09.xml15
-rw-r--r--glsa-200908-10.xml15
-rw-r--r--glsa-200909-01.xml15
-rw-r--r--glsa-200909-02.xml15
-rw-r--r--glsa-200909-03.xml17
-rw-r--r--glsa-200909-04.xml21
-rw-r--r--glsa-200909-05.xml17
-rw-r--r--glsa-200909-06.xml15
-rw-r--r--glsa-200909-07.xml15
-rw-r--r--glsa-200909-08.xml15
-rw-r--r--glsa-200909-09.xml15
-rw-r--r--glsa-200909-10.xml13
-rw-r--r--glsa-200909-11.xml15
-rw-r--r--glsa-200909-12.xml15
-rw-r--r--glsa-200909-13.xml15
-rw-r--r--glsa-200909-14.xml25
-rw-r--r--glsa-200909-15.xml19
-rw-r--r--glsa-200909-16.xml23
-rw-r--r--glsa-200909-17.xml15
-rw-r--r--glsa-200909-18.xml19
-rw-r--r--glsa-200909-19.xml15
-rw-r--r--glsa-200909-20.xml15
-rw-r--r--glsa-200910-01.xml15
-rw-r--r--glsa-200910-02.xml23
-rw-r--r--glsa-200910-03.xml57
-rw-r--r--glsa-200911-01.xml21
-rw-r--r--glsa-200911-02.xml205
-rw-r--r--glsa-200911-03.xml21
-rw-r--r--glsa-200911-04.xml15
-rw-r--r--glsa-200911-05.xml29
-rw-r--r--glsa-200911-06.xml15
-rw-r--r--glsa-200912-01.xml25
-rw-r--r--glsa-200912-02.xml33
-rw-r--r--glsa-201001-01.xml15
-rw-r--r--glsa-201001-02.xml25
-rw-r--r--glsa-201001-03.xml61
-rw-r--r--glsa-201001-04.xml23
-rw-r--r--glsa-201001-05.xml15
-rw-r--r--glsa-201001-06.xml17
-rw-r--r--glsa-201001-07.xml15
-rw-r--r--glsa-201001-08.xml21
-rw-r--r--glsa-201001-09.xml17
-rw-r--r--glsa-201003-01.xml17
-rw-r--r--glsa-201006-01.xml21
-rw-r--r--glsa-201006-02.xml17
-rw-r--r--glsa-201006-03.xml15
-rw-r--r--glsa-201006-04.xml51
-rw-r--r--glsa-201006-05.xml21
-rw-r--r--glsa-201006-06.xml15
-rw-r--r--glsa-201006-07.xml23
-rw-r--r--glsa-201006-08.xml17
-rw-r--r--glsa-201006-09.xml15
-rw-r--r--glsa-201006-10.xml15
-rw-r--r--glsa-201006-11.xml21
-rw-r--r--glsa-201006-12.xml17
-rw-r--r--glsa-201006-13.xml21
-rw-r--r--glsa-201006-14.xml15
-rw-r--r--glsa-201006-15.xml15
-rw-r--r--glsa-201006-16.xml15
-rw-r--r--glsa-201006-17.xml15
-rw-r--r--glsa-201006-18.xml77
-rw-r--r--glsa-201006-19.xml39
-rw-r--r--glsa-201006-20.xml23
-rw-r--r--glsa-201006-21.xml17
-rw-r--r--glsa-201009-01.xml17
-rw-r--r--glsa-201009-02.xml15
-rw-r--r--glsa-201009-03.xml17
-rw-r--r--glsa-201009-04.xml15
-rw-r--r--glsa-201009-05.xml95
-rw-r--r--glsa-201009-06.xml21
-rw-r--r--glsa-201009-07.xml17
-rw-r--r--glsa-201009-08.xml13
-rw-r--r--glsa-201009-09.xml15
-rw-r--r--glsa-201010-01.xml16
-rw-r--r--glsa-201011-01.xml25
-rw-r--r--glsa-201012-01.xml33
-rw-r--r--glsa-201101-01.xml15
-rw-r--r--glsa-201101-02.xml15
-rw-r--r--glsa-201101-03.xml15
-rw-r--r--glsa-201101-04.xml15
-rw-r--r--glsa-201101-05.xml15
-rw-r--r--glsa-201101-06.xml15
-rw-r--r--glsa-201101-07.xml15
-rw-r--r--glsa-201101-08.xml59
-rw-r--r--glsa-201101-09.xml135
-rw-r--r--glsa-201110-01.xml34
-rw-r--r--glsa-201110-02.xml88
-rw-r--r--glsa-201110-03.xml44
-rw-r--r--glsa-201110-04.xml30
-rw-r--r--glsa-201110-05.xml12
-rw-r--r--glsa-201110-06.xml140
-rw-r--r--glsa-201110-07.xml10
-rw-r--r--glsa-201110-08.xml14
-rw-r--r--glsa-201110-09.xml10
-rw-r--r--glsa-201110-10.xml10
-rw-r--r--glsa-201110-11.xml118
-rw-r--r--glsa-201110-12.xml12
-rw-r--r--glsa-201110-13.xml24
-rw-r--r--glsa-201110-14.xml14
-rw-r--r--glsa-201110-15.xml10
-rw-r--r--glsa-201110-16.xml14
-rw-r--r--glsa-201110-17.xml12
-rw-r--r--glsa-201110-18.xml10
-rw-r--r--glsa-201110-19.xml12
-rw-r--r--glsa-201110-20.xml24
-rw-r--r--glsa-201110-21.xml30
-rw-r--r--glsa-201110-22.xml38
-rw-r--r--glsa-201110-23.xml10
-rw-r--r--glsa-201110-24.xml24
-rw-r--r--glsa-201110-25.xml12
-rw-r--r--glsa-201110-26.xml18
-rw-r--r--glsa-201111-01.xml156
-rw-r--r--glsa-201111-02.xml170
-rw-r--r--glsa-201111-03.xml16
-rw-r--r--glsa-201111-04.xml10
-rw-r--r--glsa-201111-05.xml28
-rw-r--r--glsa-201111-06.xml10
-rw-r--r--glsa-201111-07.xml14
-rw-r--r--glsa-201111-08.xml18
-rw-r--r--glsa-201111-09.xml10
-rw-r--r--glsa-201111-10.xml16
-rw-r--r--glsa-201111-11.xml10
-rw-r--r--glsa-201111-12.xml14
-rw-r--r--glsa-201201-01.xml96
-rw-r--r--glsa-201201-02.xml70
-rw-r--r--glsa-201201-03.xml38
-rw-r--r--glsa-201201-04.xml10
-rw-r--r--glsa-201201-05.xml20
-rw-r--r--glsa-201201-06.xml10
-rw-r--r--glsa-201201-07.xml10
-rw-r--r--glsa-201201-08.xml10
-rw-r--r--glsa-201201-09.xml50
-rw-r--r--glsa-201201-10.xml12
-rw-r--r--glsa-201201-11.xml12
-rw-r--r--glsa-201201-12.xml14
-rw-r--r--glsa-201201-13.xml52
-rw-r--r--glsa-201201-14.xml12
-rw-r--r--glsa-201201-15.xml12
-rw-r--r--glsa-201201-16.xml10
-rw-r--r--glsa-201201-17.xml20
-rw-r--r--glsa-201201-18.xml12
-rw-r--r--glsa-201201-19.xml118
-rw-r--r--glsa-201202-01.xml74
-rw-r--r--glsa-201202-02.xml26
-rw-r--r--glsa-201202-03.xml10
-rw-r--r--glsa-201202-04.xml12
-rw-r--r--glsa-201202-05.xml10
-rw-r--r--glsa-201202-06.xml10
-rw-r--r--glsa-201202-07.xml16
-rw-r--r--glsa-201202-08.xml10
-rw-r--r--glsa-201202-09.xml10
-rw-r--r--glsa-201203-01.xml10
-rw-r--r--glsa-201203-02.xml16
-rw-r--r--glsa-201203-03.xml26
-rw-r--r--glsa-201203-04.xml10
-rw-r--r--glsa-201203-05.xml10
-rw-r--r--glsa-201203-06.xml12
-rw-r--r--glsa-201203-07.xml12
-rw-r--r--glsa-201203-08.xml10
-rw-r--r--glsa-201203-09.xml12
-rw-r--r--glsa-201203-10.xml12
-rw-r--r--glsa-201203-11.xml10
-rw-r--r--glsa-201203-12.xml22
-rw-r--r--glsa-201203-13.xml12
-rw-r--r--glsa-201203-14.xml18
-rw-r--r--glsa-201203-15.xml12
-rw-r--r--glsa-201203-16.xml20
-rw-r--r--glsa-201203-17.xml12
-rw-r--r--glsa-201203-18.xml8
-rw-r--r--glsa-201203-19.xml66
-rw-r--r--glsa-201203-20.xml10
-rw-r--r--glsa-201203-21.xml16
-rw-r--r--glsa-201203-22.xml18
-rw-r--r--glsa-201203-23.xml12
-rw-r--r--glsa-201203-24.xml28
-rw-r--r--glsa-201204-01.xml18
-rw-r--r--glsa-201204-02.xml10
-rw-r--r--glsa-201204-03.xml34
-rw-r--r--glsa-201204-04.xml46
-rw-r--r--glsa-201204-05.xml10
-rw-r--r--glsa-201204-06.xml14
-rw-r--r--glsa-201204-07.xml50
-rw-r--r--glsa-201204-08.xml10
-rw-r--r--glsa-201205-01.xml16
-rw-r--r--glsa-201205-02.xml14
-rw-r--r--glsa-201205-03.xml42
-rw-r--r--glsa-201205-04.xml28
-rw-r--r--glsa-201206-01.xml26
-rw-r--r--glsa-201206-02.xml10
-rw-r--r--glsa-201206-03.xml212
-rw-r--r--glsa-201206-04.xml10
-rw-r--r--glsa-201206-05.xml18
-rw-r--r--glsa-201206-06.xml10
-rw-r--r--glsa-201206-07.xml10
-rw-r--r--glsa-201206-08.xml12
-rw-r--r--glsa-201206-09.xml38
-rw-r--r--glsa-201206-10.xml14
-rw-r--r--glsa-201206-11.xml14
-rw-r--r--glsa-201206-12.xml2
-rw-r--r--glsa-201206-13.xml28
-rw-r--r--glsa-201206-14.xml24
-rw-r--r--glsa-201206-15.xml26
-rw-r--r--glsa-201206-16.xml14
-rw-r--r--glsa-201206-17.xml10
-rw-r--r--glsa-201206-18.xml16
-rw-r--r--glsa-201206-19.xml10
-rw-r--r--glsa-201206-20.xml12
-rw-r--r--glsa-201206-21.xml24
-rw-r--r--glsa-201206-22.xml34
-rw-r--r--glsa-201206-23.xml10
-rw-r--r--glsa-201206-24.xml72
-rw-r--r--glsa-201206-25.xml34
-rw-r--r--glsa-201206-26.xml24
-rw-r--r--glsa-201206-27.xml10
-rw-r--r--glsa-201206-28.xml16
-rw-r--r--glsa-201206-29.xml12
-rw-r--r--glsa-201206-30.xml10
-rw-r--r--glsa-201206-31.xml28
-rw-r--r--glsa-201206-32.xml10
-rw-r--r--glsa-201206-33.xml12
-rw-r--r--glsa-201206-34.xml10
-rw-r--r--glsa-201206-35.xml12
-rw-r--r--glsa-201206-36.xml16
-rw-r--r--glsa-201207-01.xml10
-rw-r--r--glsa-201207-02.xml10
-rw-r--r--glsa-201207-03.xml10
-rw-r--r--glsa-201207-04.xml10
-rw-r--r--glsa-201207-05.xml10
-rw-r--r--glsa-201207-06.xml10
-rw-r--r--glsa-201207-07.xml10
-rw-r--r--glsa-201207-08.xml12
-rw-r--r--glsa-201207-09.xml12
-rw-r--r--glsa-201207-10.xml28
-rw-r--r--glsa-201208-01.xml10
-rw-r--r--glsa-201208-02.xml18
-rw-r--r--glsa-201208-03.xml66
-rw-r--r--glsa-201208-04.xml14
-rw-r--r--glsa-201208-05.xml10
-rw-r--r--glsa-201208-06.xml10
-rw-r--r--glsa-201209-01.xml22
-rw-r--r--glsa-201209-02.xml58
-rw-r--r--glsa-201209-03.xml46
-rw-r--r--glsa-201209-04.xml18
-rw-r--r--glsa-201209-05.xml16
-rw-r--r--glsa-201209-06.xml18
-rw-r--r--glsa-201209-07.xml10
-rw-r--r--glsa-201209-08.xml12
-rw-r--r--glsa-201209-09.xml10
-rw-r--r--glsa-201209-10.xml10
-rw-r--r--glsa-201209-11.xml22
-rw-r--r--glsa-201209-12.xml10
-rw-r--r--glsa-201209-13.xml10
-rw-r--r--glsa-201209-14.xml10
-rw-r--r--glsa-201209-15.xml16
-rw-r--r--glsa-201209-16.xml10
-rw-r--r--glsa-201209-17.xml10
-rw-r--r--glsa-201209-18.xml12
-rw-r--r--glsa-201209-19.xml10
-rw-r--r--glsa-201209-20.xml10
-rw-r--r--glsa-201209-21.xml12
-rw-r--r--glsa-201209-22.xml10
-rw-r--r--glsa-201209-23.xml28
-rw-r--r--glsa-201209-24.xml22
-rw-r--r--glsa-201209-25.xml82
-rw-r--r--glsa-201210-01.xml10
-rw-r--r--glsa-201210-02.xml26
-rw-r--r--glsa-201210-03.xml10
-rw-r--r--glsa-201210-04.xml20
-rw-r--r--glsa-201210-05.xml12
-rw-r--r--glsa-201210-06.xml38
-rw-r--r--glsa-201210-07.xml82
-rw-r--r--glsa-201211-01.xml46
-rw-r--r--glsa-201301-01.xml1028
-rw-r--r--glsa-201301-02.xml10
-rw-r--r--glsa-201301-03.xml20
-rw-r--r--glsa-201301-04.xml10
-rw-r--r--glsa-201301-05.xml10
-rw-r--r--glsa-201301-06.xml26
-rw-r--r--glsa-201301-07.xml20
-rw-r--r--glsa-201304-01.xml12
-rw-r--r--glsa-201307-01.xml12
-rw-r--r--glsa-201308-01.xml12
-rw-r--r--glsa-201308-02.xml10
-rw-r--r--glsa-201308-03.xml158
-rw-r--r--glsa-201308-04.xml30
-rw-r--r--glsa-201308-05.xml124
-rw-r--r--glsa-201308-06.xml210
-rw-r--r--glsa-201309-01.xml10
-rw-r--r--glsa-201309-02.xml14
-rw-r--r--glsa-201309-03.xml12
-rw-r--r--glsa-201309-04.xml10
-rw-r--r--glsa-201309-05.xml12
-rw-r--r--glsa-201309-06.xml158
-rw-r--r--glsa-201309-07.xml10
-rw-r--r--glsa-201309-08.xml16
-rw-r--r--glsa-201309-09.xml16
-rw-r--r--glsa-201309-10.xml10
-rw-r--r--glsa-201309-11.xml40
-rw-r--r--glsa-201309-12.xml18
-rw-r--r--glsa-201309-13.xml14
-rw-r--r--glsa-201309-14.xml16
-rw-r--r--glsa-201309-15.xml24
-rw-r--r--glsa-201309-16.xml300
-rw-r--r--glsa-201309-17.xml14
-rw-r--r--glsa-201309-18.xml12
-rw-r--r--glsa-201309-19.xml10
-rw-r--r--glsa-201309-20.xml10
-rw-r--r--glsa-201309-21.xml10
-rw-r--r--glsa-201309-22.xml22
-rw-r--r--glsa-201309-23.xml208
-rw-r--r--glsa-201309-24.xml122
-rw-r--r--glsa-201310-01.xml10
-rw-r--r--glsa-201310-02.xml10
-rw-r--r--glsa-201310-03.xml70
-rw-r--r--glsa-201310-04.xml14
-rw-r--r--glsa-201310-05.xml10
-rw-r--r--glsa-201310-06.xml10
-rw-r--r--glsa-201310-07.xml14
-rw-r--r--glsa-201310-08.xml18
-rw-r--r--glsa-201310-09.xml10
-rw-r--r--glsa-201310-10.xml20
-rw-r--r--glsa-201310-11.xml10
-rw-r--r--glsa-201310-12.xml178
-rw-r--r--glsa-201310-13.xml20
-rw-r--r--glsa-201310-14.xml20
-rw-r--r--glsa-201310-15.xml12
-rw-r--r--glsa-201310-16.xml12
-rw-r--r--glsa-201310-17.xml10
-rw-r--r--glsa-201310-18.xml12
-rw-r--r--glsa-201310-19.xml10
-rw-r--r--glsa-201310-20.xml10
-rw-r--r--glsa-201310-21.xml38
-rw-r--r--glsa-201311-01.xml10
-rw-r--r--glsa-201311-02.xml34
-rw-r--r--glsa-201311-03.xml12
-rw-r--r--glsa-201311-04.xml10
-rw-r--r--glsa-201311-05.xml14
-rw-r--r--glsa-201311-06.xml20
-rw-r--r--glsa-201311-07.xml14
-rw-r--r--glsa-201311-08.xml10
-rw-r--r--glsa-201311-09.xml16
-rw-r--r--glsa-201311-10.xml16
-rw-r--r--glsa-201311-11.xml10
-rw-r--r--glsa-201311-12.xml10
-rw-r--r--glsa-201311-13.xml12
-rw-r--r--glsa-201311-14.xml12
-rw-r--r--glsa-201311-15.xml22
-rw-r--r--glsa-201311-16.xml10
-rw-r--r--glsa-201311-17.xml18
-rw-r--r--glsa-201311-18.xml12
-rw-r--r--glsa-201311-19.xml12
-rw-r--r--glsa-201311-20.xml10
-rw-r--r--glsa-201311-21.xml10
-rw-r--r--glsa-201311-22.xml14
-rw-r--r--glsa-201312-01.xml26
-rw-r--r--glsa-201312-02.xml14
-rw-r--r--glsa-201312-03.xml26
-rw-r--r--glsa-201312-04.xml10
-rw-r--r--glsa-201312-05.xml12
-rw-r--r--glsa-201312-06.xml10
-rw-r--r--glsa-201312-07.xml12
-rw-r--r--glsa-201312-08.xml10
-rw-r--r--glsa-201312-09.xml12
-rw-r--r--glsa-201312-10.xml10
-rw-r--r--glsa-201312-11.xml10
-rw-r--r--glsa-201312-12.xml22
-rw-r--r--glsa-201312-13.xml30
-rw-r--r--glsa-201312-14.xml10
-rw-r--r--glsa-201312-15.xml10
-rw-r--r--glsa-201312-16.xml10
-rw-r--r--glsa-201401-01.xml10
-rw-r--r--glsa-201401-02.xml10
-rw-r--r--glsa-201401-03.xml10
-rw-r--r--glsa-201401-04.xml24
-rw-r--r--glsa-201401-05.xml10
-rw-r--r--glsa-201401-06.xml10
-rw-r--r--glsa-201401-07.xml16
-rw-r--r--glsa-201401-08.xml14
-rw-r--r--glsa-201401-09.xml10
-rw-r--r--glsa-201401-10.xml24
-rw-r--r--glsa-201401-11.xml16
-rw-r--r--glsa-201401-12.xml12
-rw-r--r--glsa-201401-13.xml20
-rw-r--r--glsa-201401-14.xml16
-rw-r--r--glsa-201401-15.xml24
-rw-r--r--glsa-201401-16.xml10
-rw-r--r--glsa-201401-17.xml10
-rw-r--r--glsa-201401-18.xml10
-rw-r--r--glsa-201401-19.xml10
-rw-r--r--glsa-201401-20.xml24
-rw-r--r--glsa-201401-21.xml14
-rw-r--r--glsa-201401-22.xml10
-rw-r--r--glsa-201401-23.xml16
-rw-r--r--glsa-201401-24.xml10
-rw-r--r--glsa-201401-25.xml10
-rw-r--r--glsa-201401-26.xml10
-rw-r--r--glsa-201401-27.xml10
-rw-r--r--glsa-201401-28.xml12
-rw-r--r--glsa-201401-29.xml10
-rw-r--r--glsa-201401-30.xml506
-rw-r--r--glsa-201401-31.xml10
-rw-r--r--glsa-201401-32.xml24
-rw-r--r--glsa-201401-33.xml10
-rw-r--r--glsa-201401-34.xml22
-rw-r--r--glsa-201402-01.xml12
-rw-r--r--glsa-201402-02.xml12
-rw-r--r--glsa-201402-03.xml10
-rw-r--r--glsa-201402-04.xml12
-rw-r--r--glsa-201402-05.xml10
-rw-r--r--glsa-201402-06.xml22
-rw-r--r--glsa-201402-07.xml10
-rw-r--r--glsa-201402-08.xml10
-rw-r--r--glsa-201402-09.xml10
-rw-r--r--glsa-201402-10.xml10
-rw-r--r--glsa-201402-11.xml10
-rw-r--r--glsa-201402-12.xml10
-rw-r--r--glsa-201402-13.xml10
-rw-r--r--glsa-201402-14.xml12
-rw-r--r--glsa-201402-15.xml10
-rw-r--r--glsa-201402-16.xml14
-rw-r--r--glsa-201402-17.xml14
-rw-r--r--glsa-201402-18.xml10
-rw-r--r--glsa-201402-19.xml10
-rw-r--r--glsa-201402-20.xml14
-rw-r--r--glsa-201402-21.xml22
-rw-r--r--glsa-201402-22.xml10
-rw-r--r--glsa-201402-23.xml12
-rw-r--r--glsa-201402-24.xml18
-rw-r--r--glsa-201402-25.xml10
-rw-r--r--glsa-201402-26.xml18
-rw-r--r--glsa-201402-27.xml10
-rw-r--r--glsa-201402-28.xml12
-rw-r--r--glsa-201402-29.xml10
-rw-r--r--glsa-201403-01.xml134
-rw-r--r--glsa-201403-02.xml10
-rw-r--r--glsa-201403-03.xml10
-rw-r--r--glsa-201403-04.xml10
-rw-r--r--glsa-201403-05.xml12
-rw-r--r--glsa-201403-06.xml14
-rw-r--r--glsa-201403-07.xml10
-rw-r--r--glsa-201403-08.xml10
-rw-r--r--glsa-201404-01.xml10
-rw-r--r--glsa-201404-02.xml10
-rw-r--r--glsa-201404-03.xml10
-rw-r--r--glsa-201404-04.xml10
-rw-r--r--glsa-201404-05.xml24
-rw-r--r--glsa-201404-06.xml14
-rw-r--r--glsa-201404-07.xml12
-rw-r--r--glsa-201405-01.xml10
-rw-r--r--glsa-201405-02.xml10
-rw-r--r--glsa-201405-03.xml12
-rw-r--r--glsa-201405-04.xml28
-rw-r--r--glsa-201405-05.xml24
-rw-r--r--glsa-201405-06.xml22
-rw-r--r--glsa-201405-07.xml72
-rw-r--r--glsa-201405-08.xml18
-rw-r--r--glsa-201405-09.xml18
-rw-r--r--glsa-201405-10.xml18
-rw-r--r--glsa-201405-11.xml10
-rw-r--r--glsa-201405-12.xml14
-rw-r--r--glsa-201405-13.xml16
-rw-r--r--glsa-201405-14.xml10
-rw-r--r--glsa-201405-15.xml16
-rw-r--r--glsa-201405-16.xml10
-rw-r--r--glsa-201405-17.xml14
-rw-r--r--glsa-201405-18.xml10
-rw-r--r--glsa-201405-19.xml14
-rw-r--r--glsa-201405-20.xml10
-rw-r--r--glsa-201405-21.xml10
-rw-r--r--glsa-201405-22.xml42
-rw-r--r--glsa-201405-23.xml10
-rw-r--r--glsa-201405-24.xml16
-rw-r--r--glsa-201405-25.xml10
-rw-r--r--glsa-201405-26.xml10
-rw-r--r--glsa-201405-27.xml10
-rw-r--r--glsa-201405-28.xml10
-rw-r--r--glsa-201406-01.xml10
-rw-r--r--glsa-201406-02.xml18
-rw-r--r--glsa-201406-03.xml14
-rw-r--r--glsa-201406-04.xml10
-rw-r--r--glsa-201406-05.xml10
-rw-r--r--glsa-201406-06.xml16
-rw-r--r--glsa-201406-07.xml10
-rw-r--r--glsa-201406-08.xml20
-rw-r--r--glsa-201406-09.xml16
-rw-r--r--glsa-201406-10.xml20
-rw-r--r--glsa-201406-11.xml14
-rw-r--r--glsa-201406-12.xml10
-rw-r--r--glsa-201406-13.xml20
-rw-r--r--glsa-201406-14.xml40
-rw-r--r--glsa-201406-15.xml10
-rw-r--r--glsa-201406-16.xml18
-rw-r--r--glsa-201406-17.xml20
-rw-r--r--glsa-201406-18.xml10
-rw-r--r--glsa-201406-19.xml22
-rw-r--r--glsa-201406-20.xml10
-rw-r--r--glsa-201406-21.xml12
-rw-r--r--glsa-201406-22.xml12
-rw-r--r--glsa-201406-23.xml10
-rw-r--r--glsa-201406-24.xml12
-rw-r--r--glsa-201406-25.xml12
-rw-r--r--glsa-201406-26.xml16
-rw-r--r--glsa-201406-27.xml18
-rw-r--r--glsa-201406-28.xml57
-rw-r--r--glsa-201406-29.xml11
-rw-r--r--glsa-201406-30.xml10
-rw-r--r--glsa-201406-31.xml16
-rw-r--r--glsa-201406-32.xml464
-rw-r--r--glsa-201406-33.xml22
-rw-r--r--glsa-201406-34.xml16
-rw-r--r--glsa-201406-35.xml14
-rw-r--r--glsa-201406-36.xml26
-rw-r--r--glsa-201407-01.xml10
-rw-r--r--glsa-201407-02.xml14
-rw-r--r--glsa-201407-03.xml68
-rw-r--r--glsa-201407-04.xml10
-rw-r--r--glsa-201407-05.xml22
-rw-r--r--glsa-201408-01.xml10
-rw-r--r--glsa-201408-02.xml10
-rw-r--r--glsa-201408-03.xml10
-rw-r--r--glsa-201408-04.xml16
-rw-r--r--glsa-201408-05.xml22
-rw-r--r--glsa-201408-06.xml14
-rw-r--r--glsa-201408-07.xml12
-rw-r--r--glsa-201408-08.xml10
-rw-r--r--glsa-201408-09.xml14
-rw-r--r--glsa-201408-10.xml10
-rw-r--r--glsa-201408-11.xml60
-rw-r--r--glsa-201408-12.xml14
-rw-r--r--glsa-201408-13.xml12
-rw-r--r--glsa-201408-14.xml10
-rw-r--r--glsa-201408-15.xml32
-rw-r--r--glsa-201408-16.xml126
-rw-r--r--glsa-201408-17.xml36
-rw-r--r--glsa-201408-18.xml12
-rw-r--r--glsa-201408-19.xml60
-rw-r--r--glsa-201409-01.xml18
-rw-r--r--glsa-201409-02.xml16
-rw-r--r--glsa-201409-03.xml10
-rw-r--r--glsa-201409-04.xml80
-rw-r--r--glsa-201409-05.xml32
-rw-r--r--glsa-201409-06.xml12
-rw-r--r--glsa-201409-07.xml12
-rw-r--r--glsa-201409-08.xml10
-rw-r--r--glsa-201409-09.xml10
-rw-r--r--glsa-201409-10.xml10
-rw-r--r--glsa-201410-01.xml16
-rw-r--r--glsa-201410-02.xml10
-rw-r--r--glsa-201411-01.xml74
-rw-r--r--glsa-201411-02.xml26
-rw-r--r--glsa-201411-03.xml10
-rw-r--r--glsa-201411-04.xml14
-rw-r--r--glsa-201411-05.xml10
-rw-r--r--glsa-201411-06.xml50
-rw-r--r--glsa-201411-07.xml10
-rw-r--r--glsa-201411-08.xml16
-rw-r--r--glsa-201411-09.xml16
-rw-r--r--glsa-201411-10.xml12
-rw-r--r--glsa-201411-11.xml14
-rw-r--r--glsa-201412-01.xml20
-rw-r--r--glsa-201412-02.xml10
-rw-r--r--glsa-201412-03.xml10
-rw-r--r--glsa-201412-04.xml44
-rw-r--r--glsa-201412-05.xml10
-rw-r--r--glsa-201412-06.xml10
-rw-r--r--glsa-201412-07.xml22
-rw-r--r--glsa-201412-08.xml72
-rw-r--r--glsa-201412-09.xml132
-rw-r--r--glsa-201412-10.xml32
-rw-r--r--glsa-201412-11.xml48
-rw-r--r--glsa-201412-12.xml26
-rw-r--r--glsa-201412-13.xml54
-rw-r--r--glsa-201412-14.xml12
-rw-r--r--glsa-201412-15.xml12
-rw-r--r--glsa-201412-16.xml10
-rw-r--r--glsa-201412-17.xml26
-rw-r--r--glsa-201412-18.xml10
-rw-r--r--glsa-201412-19.xml10
-rw-r--r--glsa-201412-20.xml10
-rw-r--r--glsa-201412-21.xml12
-rw-r--r--glsa-201412-22.xml16
-rw-r--r--glsa-201412-23.xml14
-rw-r--r--glsa-201412-24.xml24
-rw-r--r--glsa-201412-25.xml10
-rw-r--r--glsa-201412-26.xml12
-rw-r--r--glsa-201412-27.xml30
-rw-r--r--glsa-201412-28.xml46
-rw-r--r--glsa-201412-29.xml46
-rw-r--r--glsa-201412-30.xml12
-rw-r--r--glsa-201412-31.xml12
-rw-r--r--glsa-201412-32.xml10
-rw-r--r--glsa-201412-33.xml18
-rw-r--r--glsa-201412-34.xml16
-rw-r--r--glsa-201412-35.xml14
-rw-r--r--glsa-201412-36.xml14
-rw-r--r--glsa-201412-37.xml14
-rw-r--r--glsa-201412-38.xml12
-rw-r--r--glsa-201412-39.xml34
-rw-r--r--glsa-201412-40.xml10
-rw-r--r--glsa-201412-41.xml10
-rw-r--r--glsa-201412-42.xml16
-rw-r--r--glsa-201412-43.xml12
-rw-r--r--glsa-201412-44.xml10
-rw-r--r--glsa-201412-45.xml10
-rw-r--r--glsa-201412-46.xml12
-rw-r--r--glsa-201412-47.xml20
-rw-r--r--glsa-201412-48.xml10
-rw-r--r--glsa-201412-49.xml16
-rw-r--r--glsa-201412-50.xml14
-rw-r--r--glsa-201412-51.xml18
-rw-r--r--glsa-201412-52.xml32
-rw-r--r--glsa-201412-53.xml16
-rw-r--r--glsa-201502-01.xml10
-rw-r--r--glsa-201502-02.xml64
-rw-r--r--glsa-201502-03.xml14
-rw-r--r--glsa-201502-04.xml62
-rw-r--r--glsa-201502-05.xml16
-rw-r--r--glsa-201502-06.xml10
-rw-r--r--glsa-201502-07.xml10
-rw-r--r--glsa-201502-08.xml30
-rw-r--r--glsa-201502-09.xml10
-rw-r--r--glsa-201502-10.xml10
-rw-r--r--glsa-201502-11.xml12
-rw-r--r--glsa-201502-12.xml166
-rw-r--r--glsa-201502-13.xml84
-rw-r--r--glsa-201502-14.xml10
-rw-r--r--glsa-201502-15.xml30
-rw-r--r--glsa-201503-01.xml18
-rw-r--r--glsa-201503-02.xml10
-rw-r--r--glsa-201503-03.xml22
-rw-r--r--glsa-201503-04.xml40
-rw-r--r--glsa-201503-05.xml48
-rw-r--r--glsa-201503-06.xml16
-rw-r--r--glsa-201503-07.xml10
-rw-r--r--glsa-201503-08.xml14
-rw-r--r--glsa-201503-09.xml30
-rw-r--r--glsa-201503-10.xml22
-rw-r--r--glsa-201503-11.xml36
-rw-r--r--glsa-201503-12.xml48
-rw-r--r--glsa-201503-13.xml12
-rw-r--r--glsa-201504-01.xml331
-rw-r--r--glsa-201504-02.xml10
-rw-r--r--glsa-201504-03.xml16
-rw-r--r--glsa-201504-04.xml48
-rw-r--r--glsa-201504-05.xml26
-rw-r--r--glsa-201504-06.xml36
-rw-r--r--glsa-201504-07.xml52
-rw-r--r--glsa-201505-01.xml24
-rw-r--r--glsa-201505-02.xml44
-rw-r--r--glsa-201505-03.xml22
-rw-r--r--glsa-201506-01.xml38
-rw-r--r--glsa-201506-02.xml22
-rw-r--r--glsa-201506-03.xml12
-rw-r--r--glsa-201506-04.xml70
-rw-r--r--glsa-201507-01.xml14
-rw-r--r--glsa-201507-02.xml12
-rw-r--r--glsa-201507-03.xml10
-rw-r--r--glsa-201507-04.xml12
-rw-r--r--glsa-201507-05.xml14
-rw-r--r--glsa-201507-06.xml12
-rw-r--r--glsa-201507-07.xml18
-rw-r--r--glsa-201507-08.xml10
-rw-r--r--glsa-201507-09.xml10
-rw-r--r--glsa-201507-10.xml10
-rw-r--r--glsa-201507-11.xml10
-rw-r--r--glsa-201507-12.xml10
-rw-r--r--glsa-201507-13.xml80
-rw-r--r--glsa-201507-14.xml44
-rw-r--r--glsa-201507-15.xml10
-rw-r--r--glsa-201507-16.xml10
-rw-r--r--glsa-201507-17.xml10
-rw-r--r--glsa-201507-18.xml16
-rw-r--r--glsa-201507-19.xml50
-rw-r--r--glsa-201507-20.xml24
-rw-r--r--glsa-201507-21.xml14
-rw-r--r--glsa-201507-22.xml10
-rw-r--r--glsa-201508-01.xml82
-rw-r--r--glsa-201508-02.xml14
-rw-r--r--glsa-201508-03.xml10
-rw-r--r--glsa-201509-01.xml14
-rw-r--r--glsa-201509-02.xml20
-rw-r--r--glsa-201509-03.xml26
-rw-r--r--glsa-201509-04.xml12
-rw-r--r--glsa-201509-05.xml10
-rw-r--r--glsa-201509-06.xml10
-rw-r--r--glsa-201509-07.xml58
-rw-r--r--glsa-201510-01.xml18
-rw-r--r--glsa-201510-02.xml16
-rw-r--r--glsa-201510-03.xml44
-rw-r--r--glsa-201510-04.xml16
-rw-r--r--glsa-201510-05.xml52
-rw-r--r--glsa-201510-06.xml14
-rw-r--r--glsa-201510-07.xml12
-rw-r--r--glsa-201510-08.xml12
-rw-r--r--glsa-201511-01.xml10
-rw-r--r--glsa-201511-02.xml76
-rw-r--r--glsa-201512-01.xml10
-rw-r--r--glsa-201512-02.xml10
-rw-r--r--glsa-201512-03.xml126
-rw-r--r--glsa-201512-04.xml18
-rw-r--r--glsa-201512-05.xml14
-rw-r--r--glsa-201512-06.xml10
-rw-r--r--glsa-201512-07.xml10
-rw-r--r--glsa-201512-08.xml24
-rw-r--r--glsa-201512-09.xml10
-rw-r--r--glsa-201512-10.xml176
-rw-r--r--glsa-201512-11.xml10
-rw-r--r--glsa-201512-12.xml10
-rw-r--r--glsa-201512-13.xml14
-rw-r--r--glsa-201601-01.xml12
-rw-r--r--glsa-201601-02.xml24
-rw-r--r--glsa-201601-03.xml198
-rw-r--r--glsa-201601-04.xml8
-rw-r--r--glsa-201601-05.xml24
-rw-r--r--glsa-201602-01.xml56
-rw-r--r--glsa-201602-02.xml36
-rw-r--r--glsa-201602-03.xml18
-rw-r--r--glsa-201603-01.xml14
-rw-r--r--glsa-201603-02.xml12
-rw-r--r--glsa-201603-03.xml12
-rw-r--r--glsa-201603-04.xml10
-rw-r--r--glsa-201603-05.xml28
-rw-r--r--glsa-201603-06.xml126
-rw-r--r--glsa-201603-07.xml100
-rw-r--r--glsa-201603-08.xml38
-rw-r--r--glsa-201603-09.xml214
-rw-r--r--glsa-201603-10.xml16
-rw-r--r--glsa-201603-11.xml186
-rw-r--r--glsa-201603-12.xml12
-rw-r--r--glsa-201603-13.xml14
-rw-r--r--glsa-201603-14.xml104
-rw-r--r--glsa-201603-15.xml24
-rw-r--r--glsa-201604-01.xml28
-rw-r--r--glsa-201604-02.xml10
-rw-r--r--glsa-201604-03.xml112
-rw-r--r--glsa-201604-04.xml8
-rw-r--r--glsa-201604-05.xml98
-rw-r--r--glsa-201605-01.xml16
-rw-r--r--glsa-201605-02.xml62
-rw-r--r--glsa-201605-03.xml10
-rw-r--r--glsa-201605-04.xml14
-rw-r--r--glsa-201605-05.xml16
-rw-r--r--glsa-201605-06.xml376
-rw-r--r--glsa-201606-01.xml14
-rw-r--r--glsa-201606-02.xml14
-rw-r--r--glsa-201606-03.xml12
-rw-r--r--glsa-201606-04.xml12
-rw-r--r--glsa-201606-05.xml22
-rw-r--r--glsa-201606-06.xml22
-rw-r--r--glsa-201606-07.xml14
-rw-r--r--glsa-201606-08.xml42
-rw-r--r--glsa-201606-09.xml28
-rw-r--r--glsa-201606-10.xml72
-rw-r--r--glsa-201606-11.xml20
-rw-r--r--glsa-201606-12.xml16
-rw-r--r--glsa-201606-13.xml4
-rw-r--r--glsa-201606-14.xml8
-rw-r--r--glsa-201606-15.xml16
-rw-r--r--glsa-201606-16.xml12
-rw-r--r--glsa-201606-17.xml26
-rw-r--r--glsa-201606-18.xml30
-rw-r--r--glsa-201606-19.xml10
-rw-r--r--glsa-201607-01.xml50
-rw-r--r--glsa-201607-02.xml54
-rw-r--r--glsa-201607-03.xml76
-rw-r--r--glsa-201607-04.xml16
-rw-r--r--glsa-201607-05.xml26
-rw-r--r--glsa-201607-06.xml12
-rw-r--r--glsa-201607-07.xml58
-rw-r--r--glsa-201607-08.xml12
-rw-r--r--glsa-201607-09.xml10
-rw-r--r--glsa-201607-10.xml12
-rw-r--r--glsa-201607-11.xml16
-rw-r--r--glsa-201607-12.xml10
-rw-r--r--glsa-201607-13.xml12
-rw-r--r--glsa-201607-14.xml10
-rw-r--r--glsa-201607-15.xml90
-rw-r--r--glsa-201607-16.xml12
-rw-r--r--glsa-201607-17.xml10
-rw-r--r--glsa-201608-01.xml16
-rw-r--r--glsa-201609-01.xml58
-rw-r--r--glsa-201609-02.xml10
-rw-r--r--glsa-201610-01.xml10
-rw-r--r--glsa-201610-02.xml18
-rw-r--r--glsa-201610-03.xml10
-rw-r--r--glsa-201610-04.xml16
-rw-r--r--glsa-201610-05.xml32
-rw-r--r--glsa-201610-06.xml44
-rw-r--r--glsa-201610-07.xml26
-rw-r--r--glsa-201610-08.xml52
-rw-r--r--glsa-201610-09.xml136
-rw-r--r--glsa-201610-10.xml90
-rw-r--r--glsa-201610-11.xml12
-rw-r--r--glsa-201611-01.xml18
-rw-r--r--glsa-201611-02.xml12
-rw-r--r--glsa-201611-03.xml12
-rw-r--r--glsa-201611-04.xml24
-rw-r--r--glsa-201611-05.xml10
-rw-r--r--glsa-201611-06.xml10
-rw-r--r--glsa-201611-07.xml10
-rw-r--r--glsa-201611-08.xml14
-rw-r--r--glsa-201611-09.xml18
-rw-r--r--glsa-201611-10.xml12
-rw-r--r--glsa-201611-11.xml48
-rw-r--r--glsa-201611-12.xml16
-rw-r--r--glsa-201611-13.xml10
-rw-r--r--glsa-201611-14.xml14
-rw-r--r--glsa-201611-15.xml10
-rw-r--r--glsa-201611-16.xml16
-rw-r--r--glsa-201611-17.xml10
-rw-r--r--glsa-201611-18.xml26
-rw-r--r--glsa-201611-19.xml10
-rw-r--r--glsa-201611-20.xml8
-rw-r--r--glsa-201611-21.xml28
-rw-r--r--glsa-201611-22.xml88
-rw-r--r--glsa-201612-01.xml12
-rw-r--r--glsa-201612-02.xml10
-rw-r--r--glsa-201612-03.xml12
-rw-r--r--glsa-201612-04.xml12
-rw-r--r--glsa-201612-05.xml10
-rw-r--r--glsa-201612-06.xml10
-rw-r--r--glsa-201612-07.xml10
-rw-r--r--glsa-201612-08.xml10
-rw-r--r--glsa-201612-09.xml18
-rw-r--r--glsa-201612-10.xml10
-rw-r--r--glsa-201612-11.xml60
-rw-r--r--glsa-201612-12.xml8
-rw-r--r--glsa-201612-13.xml10
-rw-r--r--glsa-201612-14.xml10
-rw-r--r--glsa-201612-15.xml14
-rw-r--r--glsa-201612-16.xml38
-rw-r--r--glsa-201612-17.xml10
-rw-r--r--glsa-201612-18.xml20
-rw-r--r--glsa-201612-19.xml20
-rw-r--r--glsa-201612-20.xml10
-rw-r--r--glsa-201612-21.xml12
-rw-r--r--glsa-201612-22.xml10
-rw-r--r--glsa-201612-23.xml8
-rw-r--r--glsa-201612-24.xml24
-rw-r--r--glsa-201612-25.xml10
-rw-r--r--glsa-201612-26.xml22
-rw-r--r--glsa-201612-27.xml36
-rw-r--r--glsa-201612-28.xml12
-rw-r--r--glsa-201612-29.xml10
-rw-r--r--glsa-201612-30.xml10
-rw-r--r--glsa-201612-31.xml14
-rw-r--r--glsa-201612-32.xml10
-rw-r--r--glsa-201612-33.xml10
-rw-r--r--glsa-201612-34.xml14
-rw-r--r--glsa-201612-35.xml10
-rw-r--r--glsa-201612-36.xml12
-rw-r--r--glsa-201612-37.xml10
-rw-r--r--glsa-201612-38.xml12
-rw-r--r--glsa-201612-39.xml10
-rw-r--r--glsa-201612-40.xml12
-rw-r--r--glsa-201612-41.xml14
-rw-r--r--glsa-201612-42.xml12
-rw-r--r--glsa-201612-43.xml16
-rw-r--r--glsa-201612-44.xml10
-rw-r--r--glsa-201612-45.xml10
-rw-r--r--glsa-201612-46.xml12
-rw-r--r--glsa-201612-47.xml36
-rw-r--r--glsa-201612-48.xml8
-rw-r--r--glsa-201612-49.xml10
-rw-r--r--glsa-201612-50.xml14
-rw-r--r--glsa-201612-51.xml10
-rw-r--r--glsa-201612-52.xml24
-rw-r--r--glsa-201612-53.xml18
-rw-r--r--glsa-201612-54.xml18
-rw-r--r--glsa-201612-55.xml8
-rw-r--r--glsa-201612-56.xml42
-rw-r--r--glsa-201701-01.xml60
-rw-r--r--glsa-201701-02.xml12
-rw-r--r--glsa-201701-03.xml74
-rw-r--r--glsa-201701-04.xml10
-rw-r--r--glsa-201701-05.xml10
-rw-r--r--glsa-201701-06.xml10
-rw-r--r--glsa-201701-07.xml10
-rw-r--r--glsa-201701-08.xml50
-rw-r--r--glsa-201701-09.xml10
-rw-r--r--glsa-201701-10.xml12
-rw-r--r--glsa-201701-11.xml10
-rw-r--r--glsa-201701-12.xml20
-rw-r--r--glsa-201701-13.xml16
-rw-r--r--glsa-201701-14.xml10
-rw-r--r--glsa-201701-15.xml158
-rw-r--r--glsa-201701-16.xml114
-rw-r--r--glsa-201701-17.xml42
-rw-r--r--glsa-201701-18.xml4
-rw-r--r--glsa-201701-19.xml10
-rw-r--r--glsa-201701-20.xml8
-rw-r--r--glsa-201701-21.xml20
-rw-r--r--glsa-201701-22.xml10
-rw-r--r--glsa-201701-23.xml12
-rw-r--r--glsa-201701-24.xml12
-rw-r--r--glsa-201701-25.xml12
-rw-r--r--glsa-201701-26.xml10
-rw-r--r--glsa-201701-27.xml12
-rw-r--r--glsa-201701-28.xml10
-rw-r--r--glsa-201701-29.xml10
-rw-r--r--glsa-201701-30.xml10
-rw-r--r--glsa-201701-31.xml10
-rw-r--r--glsa-201701-32.xml134
-rw-r--r--glsa-201701-33.xml20
-rw-r--r--glsa-201701-34.xml10
-rw-r--r--glsa-201701-35.xml18
-rw-r--r--glsa-201701-36.xml12
-rw-r--r--glsa-201701-37.xml42
-rw-r--r--glsa-201701-38.xml36
-rw-r--r--glsa-201701-39.xml2
-rw-r--r--glsa-201701-40.xml2
-rw-r--r--glsa-201701-41.xml2
-rw-r--r--glsa-201701-42.xml8
-rw-r--r--glsa-201701-43.xml30
-rw-r--r--glsa-201701-44.xml2
-rw-r--r--glsa-201701-45.xml8
-rw-r--r--glsa-201701-46.xml16
-rw-r--r--glsa-201701-47.xml44
-rw-r--r--glsa-201701-48.xml4
-rw-r--r--glsa-201701-49.xml30
-rw-r--r--glsa-201701-50.xml2
-rw-r--r--glsa-201701-51.xml8
-rw-r--r--glsa-201701-52.xml4
-rw-r--r--glsa-201701-53.xml2
-rw-r--r--glsa-201701-54.xml2
-rw-r--r--glsa-201701-55.xml4
-rw-r--r--glsa-201701-56.xml8
-rw-r--r--glsa-201701-57.xml14
-rw-r--r--glsa-201701-58.xml6
-rw-r--r--glsa-201701-59.xml4
-rw-r--r--glsa-201701-60.xml6
-rw-r--r--glsa-201701-61.xml2
-rw-r--r--glsa-201701-62.xml6
-rw-r--r--glsa-201701-63.xml36
-rw-r--r--glsa-201701-64.xml6
-rw-r--r--glsa-201701-65.xml36
-rw-r--r--glsa-201701-66.xml42
-rw-r--r--glsa-201701-67.xml2
-rw-r--r--glsa-201701-68.xml4
-rw-r--r--glsa-201701-69.xml2
-rw-r--r--glsa-201701-70.xml2
-rw-r--r--glsa-201701-71.xml14
-rw-r--r--glsa-201701-72.xml2
-rw-r--r--glsa-201701-73.xml4
-rw-r--r--glsa-201701-74.xml2
-rw-r--r--glsa-201701-75.xml10
-rw-r--r--glsa-201701-76.xml4
-rw-r--r--glsa-201701-77.xml2
-rw-r--r--glsa-201702-01.xml2
-rw-r--r--glsa-201702-03.xml2
-rw-r--r--glsa-201702-04.xml8
-rw-r--r--glsa-201702-05.xml2
-rw-r--r--glsa-201702-06.xml6
-rw-r--r--glsa-201702-07.xml8
-rw-r--r--glsa-201702-08.xml8
-rw-r--r--glsa-201702-09.xml20
-rw-r--r--glsa-201702-10.xml2
-rw-r--r--glsa-201702-11.xml16
-rw-r--r--glsa-201702-12.xml6
-rw-r--r--glsa-201702-13.xml16
-rw-r--r--glsa-201702-14.xml2
-rw-r--r--glsa-201702-15.xml2
-rw-r--r--glsa-201702-16.xml6
-rw-r--r--glsa-201702-17.xml36
-rw-r--r--glsa-201702-18.xml22
-rw-r--r--glsa-201702-19.xml2
-rw-r--r--glsa-201702-20.xml52
-rw-r--r--glsa-201702-21.xml2
-rw-r--r--glsa-201702-22.xml18
-rw-r--r--glsa-201702-23.xml8
-rw-r--r--glsa-201702-24.xml4
-rw-r--r--glsa-201702-25.xml8
-rw-r--r--glsa-201702-26.xml10
-rw-r--r--glsa-201702-27.xml2
-rw-r--r--glsa-201702-28.xml22
-rw-r--r--glsa-201702-29.xml10
-rw-r--r--glsa-201702-30.xml82
-rw-r--r--glsa-201702-31.xml10
-rw-r--r--glsa-201702-32.xml2
-rw-r--r--glsa-201703-01.xml4
-rw-r--r--glsa-201703-02.xml14
-rw-r--r--glsa-201703-03.xml2
-rw-r--r--glsa-201703-04.xml2
-rw-r--r--glsa-201703-05.xml2
-rw-r--r--glsa-201703-06.xml2
-rw-r--r--glsa-201703-07.xml2
-rw-r--r--glsa-201704-01.xml14
-rw-r--r--glsa-201704-02.xml44
-rw-r--r--glsa-201704-03.xml28
-rw-r--r--glsa-201704-04.xml14
-rw-r--r--glsa-201705-01.xml6
-rw-r--r--glsa-201705-02.xml24
-rw-r--r--glsa-201705-03.xml16
-rw-r--r--glsa-201705-04.xml4
-rw-r--r--glsa-201705-05.xml4
-rw-r--r--glsa-201705-06.xml18
-rw-r--r--glsa-201705-07.xml18
-rw-r--r--glsa-201705-08.xml12
-rw-r--r--glsa-201705-09.xml28
-rw-r--r--glsa-201705-10.xml54
-rw-r--r--glsa-201705-11.xml6
-rw-r--r--glsa-201705-12.xml14
-rw-r--r--glsa-201705-13.xml2
-rw-r--r--glsa-201705-14.xml2
-rw-r--r--glsa-201705-15.xml2
-rw-r--r--glsa-201706-02.xml4
-rw-r--r--glsa-201706-03.xml28
-rw-r--r--glsa-201706-04.xml2
-rw-r--r--glsa-201706-06.xml18
-rw-r--r--glsa-201706-07.xml2
-rw-r--r--glsa-201706-08.xml6
-rw-r--r--glsa-201706-09.xml2
-rw-r--r--glsa-201706-10.xml2
-rw-r--r--glsa-201706-11.xml2
-rw-r--r--glsa-201706-12.xml14
-rw-r--r--glsa-201706-13.xml2
-rw-r--r--glsa-201706-14.xml14
-rw-r--r--glsa-201706-15.xml198
-rw-r--r--glsa-201706-16.xml2
-rw-r--r--glsa-201706-17.xml4
-rw-r--r--glsa-201706-18.xml6
-rw-r--r--glsa-201706-19.xml6
-rw-r--r--glsa-201706-20.xml42
-rw-r--r--glsa-201706-21.xml2
-rw-r--r--glsa-201706-22.xml2
-rw-r--r--glsa-201706-23.xml8
-rw-r--r--glsa-201706-24.xml2
-rw-r--r--glsa-201706-25.xml2
-rw-r--r--glsa-201706-26.xml6
-rw-r--r--glsa-201706-27.xml2
-rw-r--r--glsa-201706-28.xml4
-rw-r--r--glsa-201706-29.xml2
-rw-r--r--glsa-201707-01.xml44
-rw-r--r--glsa-201707-02.xml10
-rw-r--r--glsa-201707-04.xml8
-rw-r--r--glsa-201707-05.xml8
-rw-r--r--glsa-201707-06.xml24
-rw-r--r--glsa-201707-07.xml8
-rw-r--r--glsa-201707-08.xml2
-rw-r--r--glsa-201707-09.xml2
-rw-r--r--glsa-201707-10.xml8
-rw-r--r--glsa-201707-11.xml2
-rw-r--r--glsa-201707-12.xml2
-rw-r--r--glsa-201707-13.xml4
-rw-r--r--glsa-201707-14.xml2
-rw-r--r--glsa-201707-15.xml24
-rw-r--r--glsa-201708-01.xml20
-rw-r--r--glsa-201708-02.xml10
-rw-r--r--glsa-201708-04.xml2
-rw-r--r--glsa-201708-05.xml2
-rw-r--r--glsa-201708-06.xml12
-rw-r--r--glsa-201708-08.xml2
-rw-r--r--glsa-201708-09.xml4
-rw-r--r--glsa-201708-10.xml6
-rw-r--r--glsa-201709-01.xml2
-rw-r--r--glsa-201709-13.xml2
-rw-r--r--glsa-201709-14.xml10
-rw-r--r--glsa-201709-20.xml2
-rw-r--r--glsa-201709-22.xml60
-rw-r--r--glsa-201709-24.xml2
-rw-r--r--glsa-201709-27.xml2
2518 files changed, 24914 insertions, 26463 deletions
diff --git a/glsa-200310-03.xml b/glsa-200310-03.xml
index 06a8247e..5d9e7093 100644
--- a/glsa-200310-03.xml
+++ b/glsa-200310-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200310-03">
<title>Apache: multiple buffer overflows</title>
<synopsis>
@@ -9,7 +8,7 @@
</synopsis>
<product type="ebuild">Apache</product>
<announced>2003-10-28</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>32194</bug>
<access>local</access>
<affected>
@@ -57,6 +56,6 @@
# /etc/init.d/apache restart</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542 (under review at time of GLSA)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542 (under review at time of GLSA)</uri>
</references>
</glsa>
diff --git a/glsa-200310-04.xml b/glsa-200310-04.xml
index f7884115..d5858fd1 100644
--- a/glsa-200310-04.xml
+++ b/glsa-200310-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200310-04">
<title>Apache: buffer overflows and a possible information disclosure</title>
<synopsis>
@@ -11,7 +10,7 @@
</synopsis>
<product type="ebuild">Apache</product>
<announced>2003-10-31</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>32271</bug>
<access>local</access>
<affected>
@@ -65,7 +64,7 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0789">CAN-2003-0789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0789">CAN-2003-0789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542</uri>
</references>
</glsa>
diff --git a/glsa-200311-01.xml b/glsa-200311-01.xml
index 7c14f47b..1932b80a 100644
--- a/glsa-200311-01.xml
+++ b/glsa-200311-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-01">
<title>kdebase: KDM vulnerabilities</title>
<synopsis>
@@ -58,8 +57,8 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0690">CAN-2003-0690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0692">CAN-2003-0692</uri>
- <uri link="http://www.kde.org/info/security/advisory-20030916-1.txt">KDE Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0690">CAN-2003-0690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0692">CAN-2003-0692</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20030916-1.txt">KDE Security Advisory</uri>
</references>
</glsa>
diff --git a/glsa-200311-02.xml b/glsa-200311-02.xml
index 013cdd2b..f28dd60f 100644
--- a/glsa-200311-02.xml
+++ b/glsa-200311-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-02">
<title>Opera: buffer overflows in 7.11 and 7.20</title>
<synopsis>
@@ -58,7 +57,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0870">CAN-2003-0870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0870">CAN-2003-0870</uri>
<uri link="http://www.atstake.com/research/advisories/2003/a102003-1.txt">@stake Security Advisory</uri>
</references>
</glsa>
diff --git a/glsa-200311-03.xml b/glsa-200311-03.xml
index 5e0bfe6b..aa7c8e52 100644
--- a/glsa-200311-03.xml
+++ b/glsa-200311-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-03">
<title>HylaFAX: Remote code exploit in hylafax</title>
<synopsis>
@@ -54,7 +53,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0886">CAN-2003-0886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0886">CAN-2003-0886</uri>
<uri link="http://www.novell.com/linux/security/advisories/2003_045_hylafax.html">SuSE Security Announcment</uri>
</references>
</glsa>
diff --git a/glsa-200311-04.xml b/glsa-200311-04.xml
index 7c377d71..d959f75a 100644
--- a/glsa-200311-04.xml
+++ b/glsa-200311-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-04">
<title>FreeRADIUS: heap exploit and NULL pointer dereference vulnerability</title>
<synopsis>
diff --git a/glsa-200311-05.xml b/glsa-200311-05.xml
index aad9e981..12d029f2 100644
--- a/glsa-200311-05.xml
+++ b/glsa-200311-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-05">
<title>Ethereal: security problems in ethereal 0.9.15</title>
<synopsis>
diff --git a/glsa-200311-06.xml b/glsa-200311-06.xml
index 75c71229..2e9f9fb5 100644
--- a/glsa-200311-06.xml
+++ b/glsa-200311-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-06">
<title>glibc: getgrouplist buffer overflow vulnerability</title>
<synopsis>
@@ -53,6 +52,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689">CAN-2003-0689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689">CAN-2003-0689</uri>
</references>
</glsa>
diff --git a/glsa-200311-07.xml b/glsa-200311-07.xml
index fda973d4..3c9074d0 100644
--- a/glsa-200311-07.xml
+++ b/glsa-200311-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-07">
<title>phpSysInfo: arbitrary code execution and directory traversal</title>
<synopsis>
@@ -9,7 +8,7 @@
</synopsis>
<product type="ebuild">phpSysInfo</product>
<announced>2003-11-22</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>26782</bug>
<access>local</access>
<affected>
@@ -53,6 +52,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0536">CAN-2003-0536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0536">CAN-2003-0536</uri>
</references>
</glsa>
diff --git a/glsa-200311-08.xml b/glsa-200311-08.xml
index 9ae28216..dc742152 100644
--- a/glsa-200311-08.xml
+++ b/glsa-200311-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-08">
<title>Libnids: remote code execution vulnerability</title>
<synopsis>
@@ -50,6 +49,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850">CAN-2003-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850">CAN-2003-0850</uri>
</references>
</glsa>
diff --git a/glsa-200312-01.xml b/glsa-200312-01.xml
index 325c4282..01720a92 100644
--- a/glsa-200312-01.xml
+++ b/glsa-200312-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-01">
<title>rsync.gentoo.org: rotation server compromised</title>
<synopsis>
diff --git a/glsa-200312-03.xml b/glsa-200312-03.xml
index 6c89cb79..5abb7031 100644
--- a/glsa-200312-03.xml
+++ b/glsa-200312-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-03">
<title>rsync: exploitable heap overflow</title>
<synopsis>
@@ -67,9 +66,9 @@
# /etc/init.d/rsyncd restart</code>
</resolution>
<references>
- <uri link="http://rsync.samba.org/#security_dec03">Rsync Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962">CAN-2003-0962</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200312-02.xml">GLSA-200312-02</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200312-01.xml">GLSA-200312-01</uri>
+ <uri link="https://rsync.samba.org/#security_dec03">Rsync Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962">CAN-2003-0962</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200312-02.xml">GLSA-200312-02</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200312-01.xml">GLSA-200312-01</uri>
</references>
</glsa>
diff --git a/glsa-200312-04.xml b/glsa-200312-04.xml
index 2227b28c..322e4721 100644
--- a/glsa-200312-04.xml
+++ b/glsa-200312-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-04">
<title>CVS: malformed module request vulnerability</title>
<synopsis>
@@ -61,6 +60,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977">CAN-2003-0977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977">CAN-2003-0977</uri>
</references>
</glsa>
diff --git a/glsa-200312-05.xml b/glsa-200312-05.xml
index 2f597333..3a00e476 100644
--- a/glsa-200312-05.xml
+++ b/glsa-200312-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-05">
<title>GnuPG: ElGamal signing keys compromised and format string vulnerability</title>
<synopsis>
@@ -65,7 +64,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0971">CAN-2003-0971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0971">CAN-2003-0971</uri>
<uri link="http://marc.theaimsgroup.com/?l=gnupg-announce&amp;m=106992378510843&amp;q=raw">GnuPG Announcement</uri>
<uri link="http://www.s-quadra.com/advisories/Adv-20031203.txt">S-Quadra Advisory</uri>
</references>
diff --git a/glsa-200312-06.xml b/glsa-200312-06.xml
index 8b2d4bff..71c7b1e7 100644
--- a/glsa-200312-06.xml
+++ b/glsa-200312-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-06">
<title>XChat: malformed dcc send request denial of service</title>
<synopsis>
@@ -59,6 +58,6 @@
</p>
</resolution>
<references>
- <uri link="http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html">XChat Announcement</uri>
+ <uri link="https://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html">XChat Announcement</uri>
</references>
</glsa>
diff --git a/glsa-200312-07.xml b/glsa-200312-07.xml
index 9aca78d0..90346ecc 100644
--- a/glsa-200312-07.xml
+++ b/glsa-200312-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-07">
<title>Two buffer overflows in lftp</title>
<synopsis>
@@ -8,8 +7,8 @@
a malicious ftp server, could lead to malicious code being executed.
</synopsis>
<product type="ebuild">lftp</product>
- <announced>December 13, 2003</announced>
- <revised>200312-07: 2</revised>
+ <announced>2003-12-13</announced>
+ <revised>2003-12-07: 2</revised>
<bug>35866</bug>
<access>remote</access>
<affected>
@@ -64,8 +63,8 @@
</p>
<code>
# emerge sync
- # emerge -pv '>=net-ftp/lftp-2.6.10'
- # emerge '>=net-ftp/lftp-2.6.10'
+ # emerge -pv '&gt;=net-ftp/lftp-2.6.10'
+ # emerge '&gt;=net-ftp/lftp-2.6.10'
# emerge clean</code>
</resolution>
<references>
diff --git a/glsa-200312-08.xml b/glsa-200312-08.xml
index dbe2dc2b..6ef1ec13 100644
--- a/glsa-200312-08.xml
+++ b/glsa-200312-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-08">
<title>CVS: possible root compromise when using CVS pserver</title>
<synopsis>
diff --git a/glsa-200401-01.xml b/glsa-200401-01.xml
index 2ff20019..2922a8bf 100644
--- a/glsa-200401-01.xml
+++ b/glsa-200401-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-01">
<title>Linux kernel do_mremap() local privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
which allows for local privelege escalation.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>January 08, 2004</announced>
- <revised>January 08, 2004: 01</revised>
+ <announced>2004-01-08</announced>
+ <revised>2004-01-08: 01</revised>
<bug>37292</bug>
<access>local</access>
<affected>
@@ -212,15 +211,15 @@
their system:
</p>
<code>
- $> emerge sync
- $> emerge -pv your-favourite-sources
- $> emerge your-favourite-sources
- $> # Follow usual procedure for compiling and installing a kernel.
- $> # If you use genkernel, run genkernel as you would do normally.
+ $&gt; emerge sync
+ $&gt; emerge -pv your-favourite-sources
+ $&gt; emerge your-favourite-sources
+ $&gt; # Follow usual procedure for compiling and installing a kernel.
+ $&gt; # If you use genkernel, run genkernel as you would do normally.
- $> # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
- $> # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
- $> # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
+ $&gt; # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
+ $&gt; # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
+ $&gt; # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0012-mremap.txt">Vulnerability</uri>
diff --git a/glsa-200401-02.xml b/glsa-200401-02.xml
index 111144b3..86bd801f 100644
--- a/glsa-200401-02.xml
+++ b/glsa-200401-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-02">
<title>Honeyd remote detection vulnerability via a probe packet</title>
<synopsis>
@@ -9,8 +8,8 @@
known.
</synopsis>
<product type="ebuild">honeyd</product>
- <announced>January 21, 2004</announced>
- <revised>January 21, 2004: 01</revised>
+ <announced>2004-01-21</announced>
+ <revised>2004-01-21: 01</revised>
<bug>38934</bug>
<access>remote</access>
<affected>
@@ -51,9 +50,9 @@
All users are recommended to update to honeyd version 0.8:
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=net-analyzer/honeyd-0.8"
- $> emerge ">=net-analyzer/honeyd-0.8"</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=net-analyzer/honeyd-0.8"
+ $&gt; emerge "&gt;=net-analyzer/honeyd-0.8"</code>
</resolution>
<references>
<uri link="http://www.honeyd.org/adv.2004-01.asc">Honeyd Security Advisory 2004-001</uri>
diff --git a/glsa-200401-03.xml b/glsa-200401-03.xml
index e369a813..811de0ad 100644
--- a/glsa-200401-03.xml
+++ b/glsa-200401-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-03">
<title>Apache mod_python Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
malformed query string was sent.
</synopsis>
<product type="ebuild">mod_python</product>
- <announced>January 27, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-01-27</announced>
+ <revised>2007-12-30: 02</revised>
<bug>39154</bug>
<access>remote</access>
<affected>
@@ -56,12 +55,12 @@
update their mod_python installation:
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=www-apache/mod_python-2.7.10"
- $> emerge ">=www-apache/mod_python-2.7.10"
- $> /etc/init.d/apache restart</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=www-apache/mod_python-2.7.10"
+ $&gt; emerge "&gt;=www-apache/mod_python-2.7.10"
+ $&gt; /etc/init.d/apache restart</code>
</resolution>
<references>
- <uri link="http://www.modpython.org/pipermail/mod_python/2004-January/014879.html">Mod_python 2.7.10 release announcement</uri>
+ <uri link="https://www.modpython.org/pipermail/mod_python/2004-January/014879.html">Mod_python 2.7.10 release announcement</uri>
</references>
</glsa>
diff --git a/glsa-200401-04.xml b/glsa-200401-04.xml
index 794d6193..bb7979d9 100644
--- a/glsa-200401-04.xml
+++ b/glsa-200401-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-04">
<title>GAIM 0.75 Remote overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
GAIM that could lead to a remote compromise of the IM client.
</synopsis>
<product type="ebuild">GAIM</product>
- <announced>January 26, 2004</announced>
- <revised>January 26, 2004: 01</revised>
+ <announced>2004-01-26</announced>
+ <revised>2004-01-26: 01</revised>
<bug>39470</bug>
<access>man-in-the-middle</access>
<affected>
@@ -68,9 +67,9 @@
All users are recommended to upgrade GAIM to 0.75-r7.
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=net-im/gaim-0.75-r7"
- $> emerge ">=net-im/gaim-0.75-r7"</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=net-im/gaim-0.75-r7"
+ $&gt; emerge "&gt;=net-im/gaim-0.75-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/351235/2004-01-23/2004-01-29/0">Security advisory from Stefan Esser</uri>
diff --git a/glsa-200402-01.xml b/glsa-200402-01.xml
index 827e1220..92d65863 100644
--- a/glsa-200402-01.xml
+++ b/glsa-200402-01.xml
@@ -1,19 +1,18 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-01">
<title>PHP setting leaks from .htaccess files on virtual hosts</title>
<synopsis>
- If the server configuration &quot;php.ini&quot; file has
- &quot;register_globals = on&quot; and a request is made to one virtual host
- (which has &quot;php_admin_flag register_globals off&quot;) and the next
+ If the server configuration "php.ini" file has
+ "register_globals = on" and a request is made to one virtual host
+ (which has "php_admin_flag register_globals off") and the next
request is sent to the another virtual host (which does not have the
setting) global variables may leak and may be used to exploit the
site.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>February 07, 2004</announced>
- <revised>February 07, 2004: 01</revised>
+ <announced>2004-02-07</announced>
+ <revised>2004-02-07: 01</revised>
<bug>39952</bug>
<access>remote</access>
<affected>
@@ -30,9 +29,9 @@
</background>
<description>
<p>
- If the server configuration &quot;php.ini&quot; file has
- &quot;register_globals = on&quot; and a request is made to one virtual host
- (which has &quot;php_admin_flag register_globals off&quot;) and the next
+ If the server configuration "php.ini" file has
+ "register_globals = on" and a request is made to one virtual host
+ (which has "php_admin_flag register_globals off") and the next
request is sent to the another virtual host (which does not have the
setting) through the same apache child, the setting will persist.
</p>
@@ -45,7 +44,7 @@
result, users are urged to upgrade their PHP installations.
</p>
<p>
- Gentoo ships PHP with &quot;register_globals&quot; set to &quot;off&quot;
+ Gentoo ships PHP with "register_globals" set to "off"
by default.
</p>
<p>
@@ -64,10 +63,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-php/mod_php-4.3.4-r4"
- # emerge ">=dev-php/mod_php-4.3.4-r4"</code>
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.4-r4"
+ # emerge "&gt;=dev-php/mod_php-4.3.4-r4"</code>
</resolution>
<references>
- <uri link="http://bugs.php.net/bug.php?id=25753">Corresponding PHP bug</uri>
+ <uri link="https://bugs.php.net/bug.php?id=25753">Corresponding PHP bug</uri>
</references>
</glsa>
diff --git a/glsa-200402-02.xml b/glsa-200402-02.xml
index 8f60b934..f4906cfb 100644
--- a/glsa-200402-02.xml
+++ b/glsa-200402-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-02">
<title>XFree86 Font Information File Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Window System allows local attackers to gain root privileges.
</synopsis>
<product type="ebuild">200402-02</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<access>local</access>
<affected>
<package name="x11-base/xfree" auto="yes" arch="*">
@@ -44,11 +43,11 @@
To reproduce the overflow on the command line one can run:
</p>
<code>
- # cat > fonts.dir &lt;&lt;EOF
+ # cat &gt; fonts.dir &lt;&lt;EOF
1
word.bdf -misc-fixed-medium-r-semicondensed--13-120-75-75-c-60-iso8859-1
EOF
- # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' > fonts.alias
+ # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' &gt; fonts.alias
# X :0 -fp $PWD</code>
<p>
{Some output removed}... Server aborting... Segmentation fault (core dumped)
@@ -84,8 +83,7 @@
# emerge x11-base/xfree</code>
</resolution>
<references>
- <uri
- link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0083">CVE: CAN-2004-0083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0083">CVE: CAN-2004-0083</uri>
<uri link="http://www.idefense.com/application/poi/display?id=72&amp;type=vulnerabilities">Vulnerability:
XFree86 Font Information File Buffer Overflow</uri>
</references>
diff --git a/glsa-200402-03.xml b/glsa-200402-03.xml
index de5809f2..8c719c15 100644
--- a/glsa-200402-03.xml
+++ b/glsa-200402-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-03">
<title>Monkeyd Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
launched against the webserver.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<bug>41156</bug>
<access>remote</access>
<affected>
@@ -50,10 +49,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=www-servers/monkeyd-0.8.2"
- # emerge ">=www-servers/monkeyd-0.8.2"</code>
+ # emerge -pv "&gt;=www-servers/monkeyd-0.8.2"
+ # emerge "&gt;=www-servers/monkeyd-0.8.2"</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/monkeyd/monkeyd/src/utils.c?r1=1.3&amp;r2=1.4">CVS Patch</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/monkeyd/monkeyd/src/utils.c?r1=1.3&amp;r2=1.4">CVS Patch</uri>
</references>
</glsa>
diff --git a/glsa-200402-04.xml b/glsa-200402-04.xml
index 379f664d..9700e941 100644
--- a/glsa-200402-04.xml
+++ b/glsa-200402-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-04">
<title>Gallery 1.4.1 and below remote exploit vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
remote exploit of your webserver.
</synopsis>
<product type="ebuild">Gallery</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<bug>39638</bug>
<access>remote</access>
<affected>
@@ -57,8 +56,8 @@
</p>
<code>
# emerge sync
- # emerge -p ">=www-apps/gallery-1.4.1_p1"
- # emerge ">=www-apps/gallery-1.4.1_p1"</code>
+ # emerge -p "&gt;=www-apps/gallery-1.4.1_p1"
+ # emerge "&gt;=www-apps/gallery-1.4.1_p1"</code>
</resolution>
<references>
</references>
diff --git a/glsa-200402-05.xml b/glsa-200402-05.xml
index cf5005ed..32b445a5 100644
--- a/glsa-200402-05.xml
+++ b/glsa-200402-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-05">
<title>phpMyAdmin &lt; 2.5.6-rc1: possible attack against export.php</title>
<synopsis>
@@ -8,8 +7,8 @@
generated input could lead to a directory traversal attack.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<bug>40268</bug>
<access>remote</access>
<affected>
@@ -55,11 +54,11 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-db/phpmyadmin-2.5.6_rc1"
- # emerge ">=dev-db/phpmyadmin-2.5.6_rc1"
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.5.6_rc1"
+ # emerge "&gt;=dev-db/phpmyadmin-2.5.6_rc1"
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/phpmyadmin/phpMyAdmin/export.php?r1=2.3&amp;r2=2.3.2.1">CVS Patch</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/phpmyadmin/phpMyAdmin/export.php?r1=2.3&amp;r2=2.3.2.1">CVS Patch</uri>
</references>
</glsa>
diff --git a/glsa-200402-06.xml b/glsa-200402-06.xml
index c29bb140..b4ec7afd 100644
--- a/glsa-200402-06.xml
+++ b/glsa-200402-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-06">
<title>Updated kernel packages fix the AMD64 ptrace vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
elevated priveleges.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<access>local</access>
<affected>
<package name="sys-kernel/ck-sources" auto="yes" arch="amd64">
diff --git a/glsa-200402-07.xml b/glsa-200402-07.xml
index c2e0e082..633dbd72 100644
--- a/glsa-200402-07.xml
+++ b/glsa-200402-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-07">
<title>Clam Antivirus DoS vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
programs that rely on the clamav daemon, such as SMTP daemons.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<bug>41248</bug>
<access>remote</access>
<affected>
@@ -58,8 +57,8 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=app-antivirus/clamav-0.6.7"
- # emerge ">=app-antivirus/clamav-0.6.7"</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.6.7"
+ # emerge "&gt;=app-antivirus/clamav-0.6.7"</code>
</resolution>
<references>
</references>
diff --git a/glsa-200403-01.xml b/glsa-200403-01.xml
index 18c812ae..1c6ecdab 100644
--- a/glsa-200403-01.xml
+++ b/glsa-200403-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-01">
<title>Libxml2 URI Parsing Buffer Overflow Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libxml</product>
- <announced>March 05, 2004</announced>
- <revised>March 05, 2004: 01</revised>
+ <announced>2004-03-05</announced>
+ <revised>2004-03-05: 01</revised>
<bug>42735</bug>
<access>local and remote combination</access>
<affected>
@@ -44,10 +43,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-libs/libxml2-2.6.6"
- # emerge ">=dev-libs/libxml2-2.6.6"</code>
+ # emerge -pv "&gt;=dev-libs/libxml2-2.6.6"
+ # emerge "&gt;=dev-libs/libxml2-2.6.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110">CVE 2004-0110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110">CVE 2004-0110</uri>
</references>
</glsa>
diff --git a/glsa-200403-02.xml b/glsa-200403-02.xml
index f0332c98..8a395174 100644
--- a/glsa-200403-02.xml
+++ b/glsa-200403-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-02">
<title>Linux kernel do_mremap local privilege escalation vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
escalations.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>March 05, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-03-05</announced>
+ <revised>2006-05-22: 03</revised>
<bug>42024</bug>
<access>local</access>
<affected>
@@ -228,15 +227,15 @@
# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.
- # # IF YOUR KERNEL IS MARKED as &quot;remerge required!&quot; THEN
+ # # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
# # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
# # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt">Advisory released by iSEC</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077">CVE-2004-0077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077">CVE-2004-0077</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 2 Apr 2005 12:59:08 +0000">
+ <metadata tag="submitter" timestamp="2005-04-02T12:59:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200403-03.xml b/glsa-200403-03.xml
index f31e4278..d515bafc 100644
--- a/glsa-200403-03.xml
+++ b/glsa-200403-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-03">
<title>Multiple OpenSSL Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
suite for the TLS protocol developed by Codenomicon Ltd.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>March 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>44941</bug>
<access>remote</access>
<affected>
@@ -77,15 +76,15 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-libs/openssl-0.9.7d&quot;
- # emerge &quot;&gt;=dev-libs/openssl-0.9.7d&quot;</code>
+ # emerge -pv "&gt;=dev-libs/openssl-0.9.7d"
+ # emerge "&gt;=dev-libs/openssl-0.9.7d"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079">CVE-2004-0079</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081">CVE-2004-0081</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112">CVE-2004-0112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079">CVE-2004-0079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081">CVE-2004-0081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112">CVE-2004-0112</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:54:03 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:54:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200403-04.xml b/glsa-200403-04.xml
index 273e0fce..8e1ed7ca 100644
--- a/glsa-200403-04.xml
+++ b/glsa-200403-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-04">
<title>Multiple security vulnerabilities in Apache 2</title>
<synopsis>
@@ -11,8 +10,8 @@
mod_disk_cache module.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>March 22, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-03-22</announced>
+ <revised>2007-12-30: 03</revised>
<bug>45206</bug>
<access>remote</access>
<affected>
@@ -79,8 +78,8 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/apache-2.0.49&quot;
- # emerge &quot;&gt;=www-servers/apache-2.0.49&quot;
+ # emerge -pv "&gt;=www-servers/apache-2.0.49"
+ # emerge "&gt;=www-servers/apache-2.0.49"
# ** IMPORTANT **
@@ -102,10 +101,10 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9933/info/">Apache mod_disk_cache authentication storage weakness vulnerability</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement2.html">Apache HTTP Server 2.0.49 Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113">CVE-2004-0113</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement2.html">Apache HTTP Server 2.0.49 Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113">CVE-2004-0113</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:52:59 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:52:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200403-05.xml b/glsa-200403-05.xml
index a768342b..da9467bb 100644
--- a/glsa-200403-05.xml
+++ b/glsa-200403-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-05">
<title>UUDeview MIME Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
extensions) may cause UUDeview to crash or execute arbitrary code.
</synopsis>
<product type="ebuild">UUDeview</product>
- <announced>March 26, 2004</announced>
- <revised>March 26, 2004: 01</revised>
+ <announced>2004-03-26</announced>
+ <revised>2004-03-26: 01</revised>
<bug>44859</bug>
<access>remote</access>
<affected>
@@ -57,8 +56,8 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=app-text/uudeview-0.5.20"
- # emerge ">=app-text/uudeview-0.5.20"
+ # emerge -pv "&gt;=app-text/uudeview-0.5.20"
+ # emerge "&gt;=app-text/uudeview-0.5.20"
</code>
</resolution>
<references>
diff --git a/glsa-200403-06.xml b/glsa-200403-06.xml
index ad456273..3b878e8d 100644
--- a/glsa-200403-06.xml
+++ b/glsa-200403-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-06">
<title>Multiple remote buffer overflow vulnerabilities in Courier</title>
<synopsis>
@@ -9,8 +8,8 @@
allowing unauthorized access to a vulnerable system.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>March 26, 2004</announced>
- <revised>March 26, 2004: 01</revised>
+ <announced>2004-03-26</announced>
+ <revised>2004-03-26: 01</revised>
<bug>45584</bug>
<access>remote</access>
<affected>
@@ -56,17 +55,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/courier-imap-3.0.0"
- # emerge ">=net-mail/courier-imap-3.0.0"
+ # emerge -pv "&gt;=net-mail/courier-imap-3.0.0"
+ # emerge "&gt;=net-mail/courier-imap-3.0.0"
# ** Or; depending on your installation... **
- # emerge -pv ">=mail-mta/courier-0.45"
- # emerge ">=mail-mta/courier-0.45"
+ # emerge -pv "&gt;=mail-mta/courier-0.45"
+ # emerge "&gt;=mail-mta/courier-0.45"
</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9845">Courier Multiple Remote Buffer Overflow Vulnerabilities</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0224">CAN-2004-0224</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0224">CAN-2004-0224</uri>
</references>
</glsa>
diff --git a/glsa-200403-07.xml b/glsa-200403-07.xml
index d6dc15f9..bdfa196a 100644
--- a/glsa-200403-07.xml
+++ b/glsa-200403-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-07">
<title>Multiple remote overflows and vulnerabilities in Ethereal</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the program or run arbitrary code.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>March 28, 2004</announced>
- <revised>March 28, 2004: 01</revised>
+ <announced>2004-03-28</announced>
+ <revised>2004-03-28: 01</revised>
<bug>45543</bug>
<access>remote</access>
<affected>
@@ -23,13 +22,13 @@
Quote from http://www.ethereal.com
</p>
<p>
- &quot;Ethereal is used by network professionals around the world for
+ "Ethereal is used by network professionals around the world for
troubleshooting, analysis, software and protocol development, and
education. It has all of the standard features you would expect in a
protocol analyzer, and several features not seen in any other product. Its
open source license allows talented experts in the networking community to
add enhancements. It runs on all popular computing platforms, including
- Unix, Linux, and Windows.&quot;
+ Unix, Linux, and Windows."
</p>
</background>
<description>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv ">=net-analyzer/ethereal-0.10.3"
- # emerge ">=net-analyzer/ethereal-0.10.3"</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.3"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.3"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00013.html">Multiple security problems in Ethereal 0.10.2</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0176">CAN-2004-0176</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0365">CAN-2004-0365</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0367">CAN-2004-0367</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0176">CAN-2004-0176</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0365">CAN-2004-0365</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0367">CAN-2004-0367</uri>
</references>
</glsa>
diff --git a/glsa-200403-08.xml b/glsa-200403-08.xml
index ca445d0b..38790253 100644
--- a/glsa-200403-08.xml
+++ b/glsa-200403-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-08">
<title>oftpd DoS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
crash the oftpd daemon.
</synopsis>
<product type="ebuild">oftpd</product>
- <announced>March 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45738</bug>
<access>remote</access>
<affected>
@@ -20,8 +19,7 @@
</affected>
<background>
<p>
- Quote from <uri
- link="http://www.time-travellers.org/oftpd/">http://www.time-travellers
+ Quote from <uri link="http://www.time-travellers.org/oftpd/">http://www.time-travellers
.org/oftpd/</uri>
</p>
<p>
@@ -62,14 +60,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-ftp/oftpd-0.3.7&quot;
- # emerge &quot;&gt;=net-ftp/oftpd-0.3.7&quot;</code>
+ # emerge -pv "&gt;=net-ftp/oftpd-0.3.7"
+ # emerge "&gt;=net-ftp/oftpd-0.3.7"</code>
</resolution>
<references>
- <uri link="http://www.time-travellers.org/oftpd/oftpd-dos.html">osftpd DoS Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0376">CVE-2004-0376</uri>
+ <uri link="https://www.time-travellers.org/oftpd/oftpd-dos.html">osftpd DoS Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0376">CVE-2004-0376</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:52:22 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:52:22Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200403-09.xml b/glsa-200403-09.xml
index cdf73929..12c43631 100644
--- a/glsa-200403-09.xml
+++ b/glsa-200403-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-09">
<title>Buffer overflow in Midnight Commander</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code to be run on a user's computer
</synopsis>
<product type="ebuild">mc</product>
- <announced>March 29, 2004</announced>
- <revised>March 29, 2004: 01</revised>
+ <announced>2004-03-29</announced>
+ <revised>2004-03-29: 01</revised>
<bug>45957</bug>
<access>remote</access>
<affected>
@@ -48,10 +47,10 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/mc-4.6.0-r5"
- # emerge ">=app-misc/mc-4.6.0-r5"</code>
+ # emerge -pv "&gt;=app-misc/mc-4.6.0-r5"
+ # emerge "&gt;=app-misc/mc-4.6.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023">CAN-2003-1023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023">CAN-2003-1023</uri>
</references>
</glsa>
diff --git a/glsa-200403-10.xml b/glsa-200403-10.xml
index 939654c6..f592667b 100644
--- a/glsa-200403-10.xml
+++ b/glsa-200403-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-10">
<title>Fetchmail 6.2.5 fixes a remote DoS</title>
<synopsis>
@@ -8,8 +7,8 @@
specially-crafted email to a fetchmail user.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>March 30, 2004</announced>
- <revised>March 30, 2004: 01</revised>
+ <announced>2004-03-30</announced>
+ <revised>2004-03-30: 01</revised>
<bug>37717</bug>
<access>remote</access>
<affected>
@@ -49,11 +48,11 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=net-mail/fetchmail-6.2.5"
- # emerge ">=net-mail/fetchmail-6.2.5"</code>
+ # emerge -pv "&gt;=net-mail/fetchmail-6.2.5"
+ # emerge "&gt;=net-mail/fetchmail-6.2.5"</code>
</resolution>
<references>
<uri link="http://xforce.iss.net/xforce/xfdb/13450">ISS X-Force Listing</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792">CVE Candidate (CAN-2003-0792)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792">CVE Candidate (CAN-2003-0792)</uri>
</references>
</glsa>
diff --git a/glsa-200403-11.xml b/glsa-200403-11.xml
index f7354ed4..7abb28f9 100644
--- a/glsa-200403-11.xml
+++ b/glsa-200403-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-11">
<title>Squid ACL [url_regex] bypass vulnerability</title>
<synopsis>
@@ -11,8 +10,8 @@
ACL.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>March 30, 2004</announced>
- <revised>September 02, 2004: 02</revised>
+ <announced>2004-03-30</announced>
+ <revised>2004-09-02: 02</revised>
<bug>45273</bug>
<access>remote</access>
<affected>
@@ -32,13 +31,13 @@
<description>
<p>
A bug in Squid allows users to bypass certain access controls by passing a
- URL containing &quot;%00&quot; which exploits the Squid decoding function.
+ URL containing "%00" which exploits the Squid decoding function.
This may insert a NUL character into decoded URLs, which may allow users to
bypass url_regex access control lists that are enforced upon them.
</p>
<p>
In such a scenario, Squid will insert a NUL character after
- the&quot;%00&quot; and it will make a comparison between the URL to the end
+ the"%00" and it will make a comparison between the URL to the end
of the NUL character rather than the contents after it: the comparison does
not result in a match, and the user's request is not denied.
</p>
@@ -65,14 +64,14 @@
<code>
# emerge sync
- # emerge -pv ">=net-proxy/squid-2.5.5"
- # emerge ">=net-proxy/squid-2.5.5"</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.5"
+ # emerge "&gt;=net-proxy/squid-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189">CAN-2004-0189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189">CAN-2004-0189</uri>
<uri link="http://www.squid-cache.org/Advisories/SQUID-2004_1.txt">Squid 2.5.STABLE5 Release Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 21:11:59 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T21:11:59Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200403-12.xml b/glsa-200403-12.xml
index 1171ed6d..b04d50e9 100644
--- a/glsa-200403-12.xml
+++ b/glsa-200403-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-12">
<title>OpenLDAP DoS Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
using the back-ldbm backend, to free memory that was never allocated.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>March 31, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>26728</bug>
<access>remote</access>
<affected>
@@ -56,14 +55,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-nds/openldap-2.1.13&quot;
- # emerge &quot;&gt;=net-nds/openldap-2.1.13&quot;</code>
+ # emerge -pv "&gt;=net-nds/openldap-2.1.13"
+ # emerge "&gt;=net-nds/openldap-2.1.13"</code>
</resolution>
<references>
- <uri link="http://www.openldap.org/its/index.cgi?findid=2390">OpenLDAP ITS Bug and Patch</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1201">CVE-2003-1201</uri>
+ <uri link="https://www.openldap.org/its/index.cgi?findid=2390">OpenLDAP ITS Bug and Patch</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1201">CVE-2003-1201</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:51:37 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:51:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200403-13.xml b/glsa-200403-13.xml
index 5e3d2037..a63078e7 100644
--- a/glsa-200403-13.xml
+++ b/glsa-200403-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-13">
<title>Remote buffer overflow in MPlayer</title>
<synopsis>
@@ -8,8 +7,8 @@
that may allow attackers to run arbitrary code on a user's computer.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>March 31, 2004</announced>
- <revised>October 11, 2006: 03</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-10-11: 03</revised>
<bug>46246</bug>
<access>remote</access>
<affected>
@@ -69,30 +68,30 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-0.92-r1&quot;
- # emerge &quot;&gt;=media-video/mplayer-0.92-r1&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-0.92-r1"
+ # emerge "&gt;=media-video/mplayer-0.92-r1"</code>
<p>
AMD64 users should:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre2-r1&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre2-r1&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre2-r1"
+ # emerge "&gt;=media-video/mplayer-1.0_pre2-r1"</code>
<p>
PPC users should:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre3-r2&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre3-r2&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre3-r2"
+ # emerge "&gt;=media-video/mplayer-1.0_pre3-r2"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/homepage/design6/news.html">MPlayerHQ News</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386">CVE-2004-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386">CVE-2004-0386</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:45:24 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:45:24Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200403-14.xml b/glsa-200403-14.xml
index 0d910a46..f2939a5d 100644
--- a/glsa-200403-14.xml
+++ b/glsa-200403-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-14">
<title>Multiple Security Vulnerabilities in Monit</title>
<synopsis>
@@ -8,8 +7,8 @@
Monit.
</synopsis>
<product type="ebuild">app-admin/monit</product>
- <announced>March 31, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>43967</bug>
<access>remote</access>
<affected>
@@ -58,16 +57,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/monit-4.2&quot;
- # emerge &quot;&gt;=app-admin/monit-4.2&quot;</code>
+ # emerge -pv "&gt;=app-admin/monit-4.2"
+ # emerge "&gt;=app-admin/monit-4.2"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9098">Monit HTTP Content-Length Parameter Denial of Service Vulnerability</uri>
<uri link="http://www.securityfocus.com/bid/9099">Monit Overly Long HTTP Request Buffer Overrun Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1083">CVE-2003-1083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1084">CVE-2003-1084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1083">CVE-2003-1083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1084">CVE-2003-1084</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:44:45 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:44:45Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200404-01.xml b/glsa-200404-01.xml
index e852dcf3..36fda1de 100644
--- a/glsa-200404-01.xml
+++ b/glsa-200404-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-01">
<title>Insecure sandbox temporary lockfile vulnerabilities in Portage</title>
<synopsis>
@@ -11,8 +10,8 @@
the system.
</synopsis>
<product type="ebuild">Portage</product>
- <announced>April 04, 2004</announced>
- <revised>April 04, 2004: 01</revised>
+ <announced>2004-04-04</announced>
+ <revised>2004-04-04: 01</revised>
<bug>21923</bug>
<access>local</access>
<affected>
@@ -26,7 +25,7 @@
Portage is Gentoo's package management system which is responsible for
installing, compiling and updating any ebuilds on the system through the
Gentoo rsync tree. Under default configurations, most ebuilds run under a
- sandbox which prevent the build process writing to the &quot;real&quot;
+ sandbox which prevent the build process writing to the "real"
system outside the build directory - packages are installed into a
temporary location and then copied over safely by Portage instead. During
the process the sandbox wrapper creates lockfiles in the /tmp directory
@@ -84,8 +83,8 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/portage-2.0.50-r3"
- # emerge ">=sys-apps/portage-2.0.50-r3"</code>
+ # emerge -pv "&gt;=sys-apps/portage-2.0.50-r3"
+ # emerge "&gt;=sys-apps/portage-2.0.50-r3"</code>
</resolution>
<references>
</references>
diff --git a/glsa-200404-02.xml b/glsa-200404-02.xml
index 73d1614d..2d9e3f5f 100644
--- a/glsa-200404-02.xml
+++ b/glsa-200404-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-02">
<title>KDE Personal Information Management Suite Remote Buffer Overflow Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthorized access to an affected system.
</synopsis>
<product type="ebuild">kde-base/kde</product>
- <announced>April 06, 2004</announced>
- <revised>April 06, 2004: 01</revised>
+ <announced>2004-04-06</announced>
+ <revised>2004-04-06: 01</revised>
<bug>38256</bug>
<access>remote</access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kde-3.1.5"
- # emerge ">=kde-base/kde-3.1.5"</code>
+ # emerge -pv "&gt;=kde-base/kde-3.1.5"
+ # emerge "&gt;=kde-base/kde-3.1.5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0988">CAN-2003-0988</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0988">CAN-2003-0988</uri>
</references>
<metadata tag="submitter">aescriva</metadata>
</glsa>
diff --git a/glsa-200404-03.xml b/glsa-200404-03.xml
index 37c74e98..841bd80f 100644
--- a/glsa-200404-03.xml
+++ b/glsa-200404-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-03">
<title>Tcpdump Vulnerabilities in ISAKMP Parsing</title>
<synopsis>
@@ -8,8 +7,8 @@
parsing of ISAKMP packets.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>March 31, 2004</announced>
- <revised>March 31, 2004: 01</revised>
+ <announced>2004-03-31</announced>
+ <revised>2004-03-31: 01</revised>
<bug>38206</bug>
<bug>46258</bug>
<access>remote</access>
@@ -59,12 +58,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1"
- # emerge ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1"</code>
+ # emerge -pv "&gt;=net-libs/libpcap-0.8.3-r1" "&gt;=net-analyzer/tcpdump-3.8.3-r1"
+ # emerge "&gt;=net-libs/libpcap-0.8.3-r1" "&gt;=net-analyzer/tcpdump-3.8.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.rapid7.com/advisories/R7-0017.html">Rapid7 Advisory</uri>
- <uri link="http://rhn.redhat.com/errata/RHSA-2004-008.html">Red Hat Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989">CVE Advisory</uri>
+ <uri link="https://www.rapid7.com/advisories/R7-0017.html">Rapid7 Advisory</uri>
+ <uri link="https://rhn.redhat.com/errata/RHSA-2004-008.html">Red Hat Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989">CVE Advisory</uri>
</references>
</glsa>
diff --git a/glsa-200404-04.xml b/glsa-200404-04.xml
index 292afdb9..3a0c35bf 100644
--- a/glsa-200404-04.xml
+++ b/glsa-200404-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-04">
<title>Multiple vulnerabilities in sysstat</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code or overwrite arbitrary files
</synopsis>
<product type="ebuild">sysstat</product>
- <announced>April 06, 2004</announced>
- <revised>April 06, 2004: 01</revised>
+ <announced>2004-04-06</announced>
+ <revised>2004-04-06: 01</revised>
<bug>45159</bug>
<access>local</access>
<affected>
@@ -55,12 +54,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-admin/sysstat-5.0.2"
- # emerge ">=app-admin/sysstat-5.0.2"</code>
+ # emerge -pv "&gt;=app-admin/sysstat-5.0.2"
+ # emerge "&gt;=app-admin/sysstat-5.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0107">CVE (1)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0108">CVE (2)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0107">CVE (1)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0108">CVE (2)</uri>
</references>
<metadata tag="submitter">klieber</metadata>
</glsa>
diff --git a/glsa-200404-05.xml b/glsa-200404-05.xml
index 80727ada..a10ae20d 100644
--- a/glsa-200404-05.xml
+++ b/glsa-200404-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-05">
<title>ipsec-tools contains an X.509 certificates vulnerability.</title>
<synopsis>
@@ -8,8 +7,8 @@
with X.509 certificates.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>April 07, 2004</announced>
- <revised>April 07, 2004: 01</revised>
+ <announced>2004-04-07</announced>
+ <revised>2004-04-07: 01</revised>
<bug>47013</bug>
<access>remote</access>
<affected>
@@ -23,8 +22,8 @@
From http://ipsec-tools.sourceforge.net/ :
</p>
<p>
- &quot;IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6
- IPsec implementation.&quot;
+ "IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6
+ IPsec implementation."
</p>
</background>
<description>
@@ -54,8 +53,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-firewall/ipsec-tools-0.2.5"
- # emerge ">=net-firewall/ipsec-tools-0.2.5"</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.2.5"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.2.5"</code>
</resolution>
<references>
</references>
diff --git a/glsa-200404-06.xml b/glsa-200404-06.xml
index 7804015e..a00f338a 100644
--- a/glsa-200404-06.xml
+++ b/glsa-200404-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-06">
<title>Util-linux login may leak sensitive data</title>
<synopsis>
@@ -8,8 +7,8 @@
under certain conditions.
</synopsis>
<product type="ebuild"> </product>
- <announced>April 07, 2004</announced>
- <revised>April 07, 2004: 01</revised>
+ <announced>2004-04-07</announced>
+ <revised>2004-04-07: 01</revised>
<bug>46422</bug>
<access>remote</access>
<affected>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/util-linux-2.12"
- # emerge ">=sys-apps/util-linux-2.12"
+ # emerge -pv "&gt;=sys-apps/util-linux-2.12"
+ # emerge "&gt;=sys-apps/util-linux-2.12"
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0080">CAN-2004-0080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0080">CAN-2004-0080</uri>
</references>
<metadata tag="submitter">lcars</metadata>
</glsa>
diff --git a/glsa-200404-07.xml b/glsa-200404-07.xml
index fdc7215d..3084f67f 100644
--- a/glsa-200404-07.xml
+++ b/glsa-200404-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-07">
<title>ClamAV RAR Archive Remote Denial Of Service Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
RAR archives.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>April 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45357</bug>
<access>remote</access>
<affected>
@@ -59,11 +58,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-antivirus/clamav-0.68.1&quot;
- # emerge &quot;&gt;=app-antivirus/clamav-0.68.1&quot;</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.68.1"
+ # emerge "&gt;=app-antivirus/clamav-0.68.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1909">CVE-2004-1909</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1909">CVE-2004-1909</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200404-08.xml b/glsa-200404-08.xml
index 5e6efb78..f96f8c17 100644
--- a/glsa-200404-08.xml
+++ b/glsa-200404-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-08">
<title>GNU Automake symbolic link vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to modify data or elevate their privileges.
</synopsis>
<product type="ebuild">automake</product>
- <announced>April 08, 2004</announced>
- <revised>January 31, 2005: 05</revised>
+ <announced>2004-04-08</announced>
+ <revised>2005-01-31: 05</revised>
<bug>45646</bug>
<access>local</access>
<affected>
diff --git a/glsa-200404-09.xml b/glsa-200404-09.xml
index 7c3ba4ee..ae644470 100644
--- a/glsa-200404-09.xml
+++ b/glsa-200404-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-09">
<title>Cross-realm trust vulnerability in Heimdal</title>
<synopsis>
@@ -8,8 +7,8 @@
over a realm to impersonate anyone in the cross-realm trust path.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>46590</bug>
<access>local</access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.1"
- # emerge ">=app-crypt/heimdal-0.6.1"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.1"
+ # emerge "&gt;=app-crypt/heimdal-0.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0371">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0371">CVE</uri>
</references>
<metadata tag="submitter">klieber</metadata>
</glsa>
diff --git a/glsa-200404-10.xml b/glsa-200404-10.xml
index cb59725f..4052c658 100644
--- a/glsa-200404-10.xml
+++ b/glsa-200404-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-10">
<title>iproute local Denial of Service vulnerability</title>
<synopsis>
The iproute package allows local users to cause a denial of service.
</synopsis>
- <product type="ebuild"></product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <product type="ebuild"/>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>34294</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/iproute-20010824-r5";
- # emerge ">=sys-apps/iproute-20010824-r5";
+ # emerge -pv "&gt;=sys-apps/iproute-20010824-r5";
+ # emerge "&gt;=sys-apps/iproute-20010824-r5";
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0856">CAN-2003-0856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0856">CAN-2003-0856</uri>
</references>
<metadata tag="submitter">
lcars
diff --git a/glsa-200404-11.xml b/glsa-200404-11.xml
index fc1bdcc3..40d1cfd8 100644
--- a/glsa-200404-11.xml
+++ b/glsa-200404-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-11">
<title>Multiple Vulnerabilities in pwlib</title>
<synopsis>
@@ -8,8 +7,8 @@
denial of service or buffer overflow attack.
</synopsis>
<product type="ebuild">dev-libs/pwlib</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>45846</bug>
<access>remote</access>
<affected>
@@ -51,11 +50,11 @@
<code>
# emerge sync
- # emerge -pv ">=dev-libs/pwlib-1.5.2-r3"
- # emerge ">=dev-libs/pwlib-1.5.2-r3"</code>
+ # emerge -pv "&gt;=dev-libs/pwlib-1.5.2-r3"
+ # emerge "&gt;=dev-libs/pwlib-1.5.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097">CAN-2004-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097">CAN-2004-0097</uri>
<uri link="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">NISCC Vulnerability Advisory 006489/H323</uri>
</references>
<metadata tag="submitter">
diff --git a/glsa-200404-12.xml b/glsa-200404-12.xml
index 341307d7..d2d85a63 100644
--- a/glsa-200404-12.xml
+++ b/glsa-200404-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-12">
<title>Scorched 3D server chat box format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">scorched3d</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 08</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 08</revised>
<bug>39302</bug>
<access>remote</access>
<affected>
@@ -21,8 +20,8 @@
</affected>
<background>
<p>
- Scorched 3D is a game based loosely on the classic DOS game &quot;Scorched
- Earth&quot;. Scorched 3D adds amongst other new features a 3D island
+ Scorched 3D is a game based loosely on the classic DOS game "Scorched
+ Earth". Scorched 3D adds amongst other new features a 3D island
environment and LAN and internet play. Scorched 3D is totally free and is
available for multiple operating systems.
</p>
@@ -56,8 +55,8 @@
<code>
# emerge sync
- # emerge -pv ">=games-strategy/scorched3d-37"
- # emerge ">=games-strategy/scorched3d-37"</code>
+ # emerge -pv "&gt;=games-strategy/scorched3d-37"
+ # emerge "&gt;=games-strategy/scorched3d-37"</code>
</resolution>
<references>
</references>
diff --git a/glsa-200404-13.xml b/glsa-200404-13.xml
index 6ecbd1cb..88e5be17 100644
--- a/glsa-200404-13.xml
+++ b/glsa-200404-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-13">
<title>CVS Server and Client Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
files on both client and server.
</synopsis>
<product type="ebuild">cvs</product>
- <announced>April 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>47800</bug>
<access>remote</access>
<affected>
@@ -57,13 +56,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/cvs-1.11.15&quot;
- # emerge &quot;&gt;=dev-util/cvs-1.11.15&quot;</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.15"
+ # emerge "&gt;=dev-util/cvs-1.11.15"</code>
</resolution>
<references>
<uri link="http://ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.92&amp;content-type=text/x-cvsweb-markup">CVS commit log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0180">CVE-2004-0180</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0405">CVE-2004-0405</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0180">CVE-2004-0180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0405">CVE-2004-0405</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/glsa-200404-14.xml b/glsa-200404-14.xml
index 423b20f3..7ddc6bcc 100644
--- a/glsa-200404-14.xml
+++ b/glsa-200404-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-14">
<title>Multiple format string vulnerabilities in cadaver</title>
<synopsis>
@@ -9,8 +8,8 @@
to a malicious server.
</synopsis>
<product type="ebuild">cadaver</product>
- <announced>April 19, 2004</announced>
- <revised>April 19, 2004: 01</revised>
+ <announced>2004-04-19</announced>
+ <revised>2004-04-19: 01</revised>
<bug>47799</bug>
<access>remote </access>
<affected>
@@ -21,8 +20,7 @@
</affected>
<background>
<p>
- According to <uri
- link="http://www.webdav.org/cadaver">http://www.webdav.org/cadaver</uri>,
+ According to <uri link="http://www.webdav.org/cadaver">http://www.webdav.org/cadaver</uri>,
cadaver is a command-line WebDAV client for Unix. It supports file upload,
download, on-screen display, namespace operations (move/copy), collection
creation and deletion, and locking operations.
@@ -56,11 +54,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/cadaver-0.22.1"
- # emerge ">=net-misc/cadaver-0.22.1"</code>
+ # emerge -pv "&gt;=net-misc/cadaver-0.22.1"
+ # emerge "&gt;=net-misc/cadaver-0.22.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200404-15.xml b/glsa-200404-15.xml
index 9d92dbab..862e77b5 100644
--- a/glsa-200404-15.xml
+++ b/glsa-200404-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-15">
<title>XChat 2.0.x SOCKS5 Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
run arbitrary code.
</synopsis>
<product type="ebuild">xchat</product>
- <announced>April 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>46856</bug>
<access>remote</access>
<affected>
@@ -50,8 +49,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-irc/xchat-2.0.8-r1&quot;
- # emerge &quot;&gt;=net-irc/xchat-2.0.8-r1&quot;</code>
+ # emerge -pv "&gt;=net-irc/xchat-2.0.8-r1"
+ # emerge "&gt;=net-irc/xchat-2.0.8-r1"</code>
<p>
Note that users of the gtk1 version of xchat (1.8.*) should upgrade to
xchat-1.8.11-r1:
@@ -59,12 +58,12 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-irc/xchat-1.8.11-r1&quot;
- # emerge &quot;=net-irc/xchat-1.8.11-r1&quot;</code>
+ # emerge -pv "=net-irc/xchat-1.8.11-r1"
+ # emerge "=net-irc/xchat-1.8.11-r1"</code>
</resolution>
<references>
- <uri link="http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html">XChat 2.0.x SOCKS5 Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0409">CVE-2004-0409</uri>
+ <uri link="https://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html">XChat 2.0.x SOCKS5 Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0409">CVE-2004-0409</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200404-16.xml b/glsa-200404-16.xml
index 39357bad..18ab6fda 100644
--- a/glsa-200404-16.xml
+++ b/glsa-200404-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-16">
<title>Multiple new security vulnerabilities in monit</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to denial of service or execution of arbitrary code.
</synopsis>
<product type="ebuild">monit</product>
- <announced>April 19, 2004</announced>
- <revised>April 19, 2004: 01</revised>
+ <announced>2004-04-19</announced>
+ <revised>2004-04-19: 01</revised>
<bug>47631</bug>
<access>remote </access>
<affected>
@@ -51,8 +50,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-admin/monit-4.2.1"
- # emerge ">=app-admin/monit-4.2.1"</code>
+ # emerge -pv "&gt;=app-admin/monit-4.2.1"
+ # emerge "&gt;=app-admin/monit-4.2.1"</code>
</resolution>
<references>
<uri link="http://www.tildeslash.com/monit/secadv_20040305.txt">Monit security advisory 20040305</uri>
diff --git a/glsa-200404-17.xml b/glsa-200404-17.xml
index e1c3be44..e6d014ae 100644
--- a/glsa-200404-17.xml
+++ b/glsa-200404-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-17">
<title>ipsec-tools and iputils contain a remote DoS vulnerability</title>
<synopsis>
@@ -10,8 +9,8 @@
system resoources, causing a Denial of Service.
</synopsis>
<product type="ebuild">ipsec-utils</product>
- <announced>April 24, 2004</announced>
- <revised>April 24, 2004: 01</revised>
+ <announced>2004-04-24</announced>
+ <revised>2004-04-24: 01</revised>
<bug>48847</bug>
<access>remote </access>
<affected>
@@ -65,19 +64,19 @@
<code>
# emerge sync
- # emerge -pv ">=net-firewall/ipsec-tools-0.3.1"
- # emerge ">=net-firewall/ipsec-tools-0.3.1"</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.3.1"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.3.1"</code>
<p>
iputils users should upgrade to version 021109-r3 or later:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-misc/iputils-021109-r3"
- # emerge ">=net-misc/iputils-021109-r3"</code>
+ # emerge -pv "&gt;=net-misc/iputils-021109-r3"
+ # emerge "&gt;=net-misc/iputils-021109-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403">CVE</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200404-18.xml b/glsa-200404-18.xml
index 7a5a4cb7..5989c4ce 100644
--- a/glsa-200404-18.xml
+++ b/glsa-200404-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-18">
<title>Multiple Vulnerabilities in ssmtp</title>
<synopsis>
@@ -9,8 +8,8 @@
(potentially root).
</synopsis>
<product type="ebuild">ssmtp</product>
- <announced>April 26, 2004</announced>
- <revised>April 26, 2004: 01</revised>
+ <announced>2004-04-26</announced>
+ <revised>2004-04-26: 01</revised>
<bug>47918</bug>
<bug>48435</bug>
<access>remote root </access>
@@ -55,13 +54,13 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/ssmtp-2.60.7"
- # emerge ">=mail-mta/ssmtp-2.60.7"</code>
+ # emerge -pv "&gt;=mail-mta/ssmtp-2.60.7"
+ # emerge "&gt;=mail-mta/ssmtp-2.60.7"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/11378/">Secunia Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0156">CVE Reference</uri>
- <uri link="http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00084.html">Debian Advisory</uri>
+ <uri link="https://secunia.com/advisories/11378/">Secunia Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0156">CVE Reference</uri>
+ <uri link="https://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00084.html">Debian Advisory</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/glsa-200404-19.xml b/glsa-200404-19.xml
index daa59159..e81bb30a 100644
--- a/glsa-200404-19.xml
+++ b/glsa-200404-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-19">
<title>Buffer overflows and format string vulnerabilities in LCDproc</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing execution of arbitrary code with the rights of the LCDd user.
</synopsis>
<product type="ebuild">lcdproc</product>
- <announced>April 27, 2004</announced>
- <revised>April 27, 2004: 01</revised>
+ <announced>2004-04-27</announced>
+ <revised>2004-04-27: 01</revised>
<bug>47340</bug>
<access>remote </access>
<affected>
@@ -53,8 +52,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/lcdproc-0.4.5"
- # emerge ">=app-misc/lcdproc-0.4.5"</code>
+ # emerge -pv "&gt;=app-misc/lcdproc-0.4.5"
+ # emerge "&gt;=app-misc/lcdproc-0.4.5"</code>
</resolution>
<references>
<uri link="http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html">LCDproc advisory</uri>
diff --git a/glsa-200404-20.xml b/glsa-200404-20.xml
index 4a17cf16..9218b44d 100644
--- a/glsa-200404-20.xml
+++ b/glsa-200404-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-20">
<title>Multiple vulnerabilities in xine</title>
<synopsis>
@@ -9,8 +8,8 @@
user.
</synopsis>
<product type="ebuild">xine</product>
- <announced>April 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45448</bug>
<bug>48107</bug>
<bug>48108</bug>
@@ -69,17 +68,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/xine-ui-0.9.23-r2&quot;
- # emerge &quot;&gt;=media-video/xine-ui-0.9.23-r2&quot;
+ # emerge -pv "&gt;=media-video/xine-ui-0.9.23-r2"
+ # emerge "&gt;=media-video/xine-ui-0.9.23-r2"
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc3-r3&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc3-r3&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc3-r3"
+ # emerge "&gt;=media-libs/xine-lib-1_rc3-r3"</code>
</resolution>
<references>
<uri link="http://xinehq.de/index.php/security">Xine Security Advisories</uri>
<uri link="http://nettwerked.mg2.org/advisories/xinebug">xine-bugreport and xine-check vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0372">CVE-2004-0372</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1951">CVE-2004-1951</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0372">CVE-2004-0372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1951">CVE-2004-1951</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200404-21.xml b/glsa-200404-21.xml
index 17dd885a..3557ecb6 100644
--- a/glsa-200404-21.xml
+++ b/glsa-200404-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-21">
<title>Multiple Vulnerabilities in Samba</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerability in the smbprint script distributed with Samba.
</synopsis>
<product type="ebuild">samba</product>
- <announced>April 29, 2004</announced>
- <revised>April 29, 2004: 01</revised>
+ <announced>2004-04-29</announced>
+ <revised>2004-04-29: 01</revised>
<bug>41800</bug>
<bug>45965</bug>
<access>local </access>
@@ -74,8 +73,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.2a-r2"
- # emerge ">=net-fs/samba-3.0.2a-r2"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.2a-r2"
+ # emerge "&gt;=net-fs/samba-3.0.2a-r2"</code>
<p>
Those who are using Samba's password database also need to run the
following command:
diff --git a/glsa-200405-01.xml b/glsa-200405-01.xml
index 62aaec31..dbb59f7a 100644
--- a/glsa-200405-01.xml
+++ b/glsa-200405-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-01">
<title>Multiple format string vulnerabilities in neon 0.24.4 and earlier</title>
<synopsis>
@@ -8,8 +7,8 @@
a malicious WebDAV server to execute arbitrary code.
</synopsis>
<product type="ebuild">neon</product>
- <announced>May 09, 2004</announced>
- <revised>May 09, 2004: 01</revised>
+ <announced>2004-05-09</announced>
+ <revised>2004-05-09: 01</revised>
<bug>48448</bug>
<access>remote </access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/neon-0.24.5"
- # emerge ">=net-misc/neon-0.24.5"</code>
+ # emerge -pv "&gt;=net-misc/neon-0.24.5"
+ # emerge "&gt;=net-misc/neon-0.24.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CVE</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200405-02.xml b/glsa-200405-02.xml
index b53e858b..46b64b6a 100644
--- a/glsa-200405-02.xml
+++ b/glsa-200405-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-02">
<title>Multiple vulnerabilities in LHa</title>
<synopsis>
@@ -9,8 +8,8 @@
code or as a denial of service attack.
</synopsis>
<product type="ebuild">lha</product>
- <announced>May 09, 2004</announced>
- <revised>October 20, 2006: 02</revised>
+ <announced>2004-05-09</announced>
+ <revised>2006-10-20: 02</revised>
<bug>49961</bug>
<access>remote </access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-arch/lha-114i-r2"
- # emerge ">=app-arch/lha-114i-r2"</code>
+ # emerge -pv "&gt;=app-arch/lha-114i-r2"
+ # emerge "&gt;=app-arch/lha-114i-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0234">CAN-2004-0234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0235">CAN-2004-0235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0234">CAN-2004-0234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0235">CAN-2004-0235</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-03.xml b/glsa-200405-03.xml
index e73eed43..e7bdbdee 100644
--- a/glsa-200405-03.xml
+++ b/glsa-200405-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-03">
<title>ClamAV VirusEvent parameter vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
commands.
</synopsis>
<product type="ebuild">ClamAV</product>
- <announced>May 11, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>46264</bug>
<access>remote</access>
<affected>
@@ -64,11 +63,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-antivirus/clamav-0.70&quot;
- # emerge &quot;&gt;=app-antivirus/clamav-0.70&quot;</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.70"
+ # emerge "&gt;=app-antivirus/clamav-0.70"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1876">CVE-2004-1876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1876">CVE-2004-1876</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-04.xml b/glsa-200405-04.xml
index 1b69db39..1e88fd2f 100644
--- a/glsa-200405-04.xml
+++ b/glsa-200405-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-04">
<title>OpenOffice.org vulnerability when using DAV servers</title>
<synopsis>
@@ -9,8 +8,8 @@
when connected to an untrusted WebDAV server.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>May 11, 2004</announced>
- <revised>October 27, 2004: 02</revised>
+ <announced>2004-05-11</announced>
+ <revised>2004-10-27: 02</revised>
<bug>47926</bug>
<access>remote</access>
<affected>
@@ -76,44 +75,44 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.1-r1"
- # emerge ">=app-office/openoffice-1.1.1-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.1-r1"
+ # emerge "&gt;=app-office/openoffice-1.1.1-r1"</code>
<p>
openoffice users on the sparc architecture should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.0-r3"
- # emerge ">=app-office/openoffice-1.1.0-r3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.0-r3"
+ # emerge "&gt;=app-office/openoffice-1.1.0-r3"</code>
<p>
openoffice users on the ppc architecture should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.0.3-r1"
- # emerge ">=app-office/openoffice-1.0.3-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.0.3-r1"
+ # emerge "&gt;=app-office/openoffice-1.0.3-r1"</code>
<p>
openoffice-ximian users should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1"
- # emerge ">=app-office/openoffice-ximian-1.1.51-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-ximian-1.1.51-r1"
+ # emerge "&gt;=app-office/openoffice-ximian-1.1.51-r1"</code>
<p>
openoffice-bin users should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-bin-1.1.2"
- # emerge ">=app-office/openoffice-bin-1.1.2"</code>
+ # emerge -pv "&gt;=app-office/openoffice-bin-1.1.2"
+ # emerge "&gt;=app-office/openoffice-bin-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
- <uri link="/security/en/glsa/glsa-200405-01.xml">Neon vulnerabilities (GLSA 200405-01)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">Neon vulnerabilities (GLSA 200405-01)</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-05.xml b/glsa-200405-05.xml
index 73870645..8f194d57 100644
--- a/glsa-200405-05.xml
+++ b/glsa-200405-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-05">
<title>Utempter symlink vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">utempter</product>
- <announced>May 13, 2004</announced>
- <revised>May 13, 2004: 01</revised>
+ <announced>2004-05-13</announced>
+ <revised>2004-05-13: 01</revised>
<bug>49536</bug>
<access>local </access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/utempter-0.5.5.4"
- # emerge ">=sys-apps/utempter-0.5.5.4"</code>
+ # emerge -pv "&gt;=sys-apps/utempter-0.5.5.4"
+ # emerge "&gt;=sys-apps/utempter-0.5.5.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0233">CAN-2004-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0233">CAN-2004-0233</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200405-06.xml b/glsa-200405-06.xml
index f799484e..a322d815 100644
--- a/glsa-200405-06.xml
+++ b/glsa-200405-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-06">
<title>libpng denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
that library to decode PNG images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>May 14, 2004</announced>
- <revised>May 14, 2004: 01</revised>
+ <announced>2004-05-14</announced>
+ <revised>2004-05-14: 01</revised>
<bug>49887</bug>
<access>remote </access>
<affected>
@@ -53,8 +52,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r5"
- # emerge ">=media-libs/libpng-1.2.5-r5"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r5"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r5"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -63,7 +62,7 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421">CAN-2004-0421</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421">CAN-2004-0421</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-07.xml b/glsa-200405-07.xml
index 4a68cfcb..423862bb 100644
--- a/glsa-200405-07.xml
+++ b/glsa-200405-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-07">
<title>Exim verify=header_syntax buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Exim that allows remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Exim</product>
- <announced>May 14, 2004</announced>
- <revised>May 14, 2004: 01</revised>
+ <announced>2004-05-14</announced>
+ <revised>2004-05-14: 01</revised>
<bug>50217</bug>
<access>remote </access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/exim-4.33-r1"
- # emerge ">=mail-mta/exim-4.33-r1"</code>
+ # emerge -pv "&gt;=mail-mta/exim-4.33-r1"
+ # emerge "&gt;=mail-mta/exim-4.33-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0400">CAN-2004-0400</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0400">CAN-2004-0400</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-08.xml b/glsa-200405-08.xml
index ac244657..34c3adf8 100644
--- a/glsa-200405-08.xml
+++ b/glsa-200405-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-08">
<title>Pound format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code with the rights of the Pound process.
</synopsis>
<product type="ebuild">pound</product>
- <announced>May 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>50421</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/pound-1.6&quot;
- # emerge &quot;&gt;=www-servers/pound-1.6&quot;</code>
+ # emerge -pv "&gt;=www-servers/pound-1.6"
+ # emerge "&gt;=www-servers/pound-1.6"</code>
</resolution>
<references>
<uri link="http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000">Pound announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2026">CVE-2004-2026</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2026">CVE-2004-2026</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-09.xml b/glsa-200405-09.xml
index b8c78b25..c07ea510 100644
--- a/glsa-200405-09.xml
+++ b/glsa-200405-09.xml
@@ -1,16 +1,15 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-09">
<title>ProFTPD Access Control List bypass vulnerability</title>
<synopsis>
Version 1.2.9 of ProFTPD introduced a vulnerability that causes CIDR-based
- Access Control Lists (ACLs) to be treated as &quot;AllowAll&quot;, thereby
+ Access Control Lists (ACLs) to be treated as "AllowAll", thereby
allowing remote users full access to files available to the FTP daemon.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>May 19, 2004</announced>
- <revised>May 19, 2004: 01</revised>
+ <announced>2004-05-19</announced>
+ <revised>2004-05-19: 01</revised>
<bug>49496</bug>
<access>remote </access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-ftp/proftpd-1.2.9-r2"
- # emerge ">=net-ftp/proftpd-1.2.9-r2"</code>
+ # emerge -pv "&gt;=net-ftp/proftpd-1.2.9-r2"
+ # emerge "&gt;=net-ftp/proftpd-1.2.9-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0432">CAN-2004-0432</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0432">CAN-2004-0432</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200405-10.xml b/glsa-200405-10.xml
index d0a4bc6c..b6d0d15f 100644
--- a/glsa-200405-10.xml
+++ b/glsa-200405-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-10">
<title>Icecast denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to crash the application.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>May 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>50935</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/icecast-2.0.1&quot;
- # emerge &quot;&gt;=net-misc/icecast-2.0.1&quot;</code>
+ # emerge -pv "&gt;=net-misc/icecast-2.0.1"
+ # emerge "&gt;=net-misc/icecast-2.0.1"</code>
</resolution>
<references>
- <uri link="http://www.xiph.org/archives/icecast/7144.html">Icecast 2.0.1 announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2027">CVE-2004-2027</uri>
+ <uri link="https://www.xiph.org/archives/icecast/7144.html">Icecast 2.0.1 announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2027">CVE-2004-2027</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-11.xml b/glsa-200405-11.xml
index 271476df..140c6569 100644
--- a/glsa-200405-11.xml
+++ b/glsa-200405-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-11">
<title>KDE URI Handler Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>May 19, 2004</announced>
- <revised>May 19, 2004: 01</revised>
+ <announced>2004-05-19</announced>
+ <revised>2004-05-19: 01</revised>
<bug>51276</bug>
<access>remote </access>
<affected>
@@ -64,11 +63,11 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdelibs-3.2.2-r1"
- # emerge ">=kde-base/kdelibs-3.2.2-r1"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.2-r1"
+ # emerge "&gt;=kde-base/kdelibs-3.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0411">CAN-2004-0411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0411">CAN-2004-0411</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-12.xml b/glsa-200405-12.xml
index 1ed75d97..990556c7 100644
--- a/glsa-200405-12.xml
+++ b/glsa-200405-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-12">
<title>CVS heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise.
</synopsis>
<product type="ebuild">cvs</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51460</bug>
<access>remote </access>
<affected>
@@ -53,12 +52,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/cvs-1.11.16"
- # emerge ">=dev-util/cvs-1.11.16"</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.16"
+ # emerge "&gt;=dev-util/cvs-1.11.16"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/072004.html">E-matters advisory 07/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396">CAN-2004-0396</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396">CAN-2004-0396</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-13.xml b/glsa-200405-13.xml
index 6638fa00..7158d5f2 100644
--- a/glsa-200405-13.xml
+++ b/glsa-200405-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-13">
<title>neon heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
been discovered in the neon library.
</synopsis>
<product type="ebuild">neon</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51490</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/neon-0.24.6"
- # emerge ">=net-misc/neon-0.24.6"</code>
+ # emerge -pv "&gt;=net-misc/neon-0.24.6"
+ # emerge "&gt;=net-misc/neon-0.24.6"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/062004.html">E-matters advisory 06/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-14.xml b/glsa-200405-14.xml
index f380b67b..6b89f029 100644
--- a/glsa-200405-14.xml
+++ b/glsa-200405-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-14">
<title>Buffer overflow in Subversion</title>
<synopsis>
@@ -9,8 +8,8 @@
client and server are vulnerable.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>May 20, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>51462</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/subversion-1.0.3&quot;
- # emerge &quot;&gt;=dev-util/subversion-1.0.3&quot;</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.3"
+ # emerge "&gt;=dev-util/subversion-1.0.3"</code>
</resolution>
<references>
<uri link="http://subversion.tigris.org/servlets/ReadMsg?list=announce&amp;msgNo=125">Subversion Announcement</uri>
<uri link="http://security.e-matters.de/advisories/082004.html">E-Matters Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0397">CVE-2004-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0397">CVE-2004-0397</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/glsa-200405-15.xml b/glsa-200405-15.xml
index daa6601c..587258d3 100644
--- a/glsa-200405-15.xml
+++ b/glsa-200405-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-15">
<title>cadaver heap-based buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
connected to a malicious server.
</synopsis>
<product type="ebuild">cadaver</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51461</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/cadaver-0.22.2"
- # emerge ">=net-misc/cadaver-0.22.2"</code>
+ # emerge -pv "&gt;=net-misc/cadaver-0.22.2"
+ # emerge "&gt;=net-misc/cadaver-0.22.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-16.xml b/glsa-200405-16.xml
index 47b21e7e..6ddb603a 100644
--- a/glsa-200405-16.xml
+++ b/glsa-200405-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-16">
<title>Multiple XSS Vulnerabilities in SquirrelMail</title>
<synopsis>
SquirrelMail is subject to several XSS and one SQL injection vulnerability.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>May 25, 2004</announced>
- <revised>May 27, 2006: 04</revised>
+ <announced>2004-05-25</announced>
+ <revised>2006-05-27: 04</revised>
<bug>49675</bug>
<access>remote</access>
<affected>
@@ -54,15 +53,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-client/squirrelmail-1.4.3_rc1&quot;
- # emerge &quot;&gt;=mail-client/squirrelmail-1.4.3_rc1&quot;</code>
+ # emerge -pv "&gt;=mail-client/squirrelmail-1.4.3_rc1"
+ # emerge "&gt;=mail-client/squirrelmail-1.4.3_rc1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=4199060&amp;forum_id=1988">SquirrelMail 1.4.3_rc1 release annoucement</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=4199060&amp;forum_id=1988">SquirrelMail 1.4.3_rc1 release annoucement</uri>
<uri link="http://www.securityfocus.com/bid/10246/">Bugtraq security annoucement</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0519">CVE-2004-0519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0521">CVE-2004-0521</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0519">CVE-2004-0519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0521">CVE-2004-0521</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200405-17.xml b/glsa-200405-17.xml
index a1aa9b60..67986276 100644
--- a/glsa-200405-17.xml
+++ b/glsa-200405-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-17">
<title>Multiple vulnerabilities in metamail</title>
<synopsis>
@@ -8,8 +7,8 @@
metamail, potentially allowing execution of arbitrary code remotely.
</synopsis>
<product type="ebuild">metamail</product>
- <announced>May 21, 2004</announced>
- <revised>May 21, 2004: 01</revised>
+ <announced>2004-05-21</announced>
+ <revised>2004-05-21: 01</revised>
<bug>42133</bug>
<access>remote </access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/metamail-2.7.45.3"
- # emerge ">=net-mail/metamail-2.7.45.3"</code>
+ # emerge -pv "&gt;=net-mail/metamail-2.7.45.3"
+ # emerge "&gt;=net-mail/metamail-2.7.45.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104">CAN-2004-0104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0105">CAN-2004-0105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104">CAN-2004-0104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0105">CAN-2004-0105</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-18.xml b/glsa-200405-18.xml
index ba653d46..f0edf321 100644
--- a/glsa-200405-18.xml
+++ b/glsa-200405-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-18">
<title>Buffer Overflow in Firebird</title>
<synopsis>
@@ -9,8 +8,8 @@
binaries.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>May 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>20837</bug>
<access>local</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/firebird-1.5&quot;
- # emerge &quot;&gt;=dev-db/firebird-1.5&quot;</code>
+ # emerge -pv "&gt;=dev-db/firebird-1.5"
+ # emerge "&gt;=dev-db/firebird-1.5"</code>
</resolution>
<references>
<uri link="http://securityfocus.com/bid/7546/info/">Bugtraq Security Announcement</uri>
- <uri link=" http://sourceforge.net/tracker/?group_id=9028&amp;atid=109028&amp;func=detail&amp;aid=739480">Sourceforge BugTracker Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0281">CVE-2003-0281</uri>
+ <uri link=" https://sourceforge.net/tracker/?group_id=9028&amp;atid=109028&amp;func=detail&amp;aid=739480">Sourceforge BugTracker Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0281">CVE-2003-0281</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/glsa-200405-19.xml b/glsa-200405-19.xml
index 80a11fe1..6c637158 100644
--- a/glsa-200405-19.xml
+++ b/glsa-200405-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-19">
<title>Opera telnet URI handler file creation/truncation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker to overwrite arbitrary files.
</synopsis>
<product type="ebuild">opera</product>
- <announced>May 25, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-05-25</announced>
+ <revised>2007-12-30: 03</revised>
<bug>50857</bug>
<access>remote</access>
<affected>
@@ -62,12 +61,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-client/opera-7.50_beta1&quot;
- # emerge &quot;&gt;=www-client/opera-7.50_beta1&quot;</code>
+ # emerge -pv "&gt;=www-client/opera-7.50_beta1"
+ # emerge "&gt;=www-client/opera-7.50_beta1"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=104&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory 05.12.04</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0473">CVE-2004-0473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0473">CVE-2004-0473</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/glsa-200405-20.xml b/glsa-200405-20.xml
index 87fa404f..72b31efb 100644
--- a/glsa-200405-20.xml
+++ b/glsa-200405-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-20">
<title>Insecure Temporary File Creation In MySQL</title>
<synopsis>
@@ -9,8 +8,8 @@
data.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 25, 2004</announced>
- <revised>May 25, 2004: 01</revised>
+ <announced>2004-05-25</announced>
+ <revised>2004-05-25: 01</revised>
<bug>46242</bug>
<access>local </access>
<affected>
@@ -55,12 +54,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.18-r2"
- # emerge ">=dev-db/mysql-4.0.18-r2"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.18-r2"
+ # emerge "&gt;=dev-db/mysql-4.0.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0381">CAN-2004-0381</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0388">CAN-2004-0388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0381">CAN-2004-0381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0388">CAN-2004-0388</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/glsa-200405-21.xml b/glsa-200405-21.xml
index 9dce8e0e..bd72cd2a 100644
--- a/glsa-200405-21.xml
+++ b/glsa-200405-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-21">
<title>Midnight Commander: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
including several buffer overflows and string format vulnerabilities.
</synopsis>
<product type="ebuild">MC</product>
- <announced>May 26, 2004</announced>
- <revised>May 26, 2004: 01</revised>
+ <announced>2004-05-26</announced>
+ <revised>2004-05-26: 01</revised>
<bug>49990</bug>
<access>local </access>
<affected>
@@ -53,13 +52,13 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/mc-4.6.0-r7
- # emerge ">=app-misc/mc-4.6.0-r7"</code>
+ # emerge -pv "&gt;=app-misc/mc-4.6.0-r7
+ # emerge "&gt;=app-misc/mc-4.6.0-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226">CAN-2004-0226</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231">CAN-2004-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232">CAN-2004-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226">CAN-2004-0226</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231">CAN-2004-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232">CAN-2004-0232</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200405-22.xml b/glsa-200405-22.xml
index 9d7c41c6..ffe51487 100644
--- a/glsa-200405-22.xml
+++ b/glsa-200405-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-22">
<title>Apache 1.3: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache 1.3.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>May 26, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-05-26</announced>
+ <revised>2007-12-30: 02</revised>
<bug>51815</bug>
<access>remote </access>
<affected>
@@ -68,14 +67,14 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-1.3.31"
- # emerge ">=www-servers/apache-1.3.31"</code>
+ # emerge -pv "&gt;=www-servers/apache-1.3.31"
+ # emerge "&gt;=www-servers/apache-1.3.31"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993">CAN-2003-0993</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">CAN-2004-0174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993">CAN-2003-0993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">CAN-2004-0174</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200405-23.xml b/glsa-200405-23.xml
index 63847d12..334ae3d1 100644
--- a/glsa-200405-23.xml
+++ b/glsa-200405-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-23">
<title>Heimdal: Kerberos 4 buffer overflow in kadmin</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>May 27, 2004</announced>
- <revised>May 27, 2004: 01</revised>
+ <announced>2004-05-27</announced>
+ <revised>2004-05-27: 01</revised>
<bug>50208</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.2"
- # emerge ">=app-crypt/heimdal-0.6.2"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.2"
+ # emerge "&gt;=app-crypt/heimdal-0.6.2"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2004-05-06/">Heimdal 0.6.2 Release Notice</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0434">CAN-2004-0434</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2004-05-06/">Heimdal 0.6.2 Release Notice</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0434">CAN-2004-0434</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200405-24.xml b/glsa-200405-24.xml
index 665bdc1e..9f21a017 100644
--- a/glsa-200405-24.xml
+++ b/glsa-200405-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-24">
<title>MPlayer, xine-lib: vulnerabilities in RTSP stream handling</title>
<synopsis>
@@ -8,8 +7,8 @@
have been found in code common to MPlayer and the xine library.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 28, 2004</announced>
- <revised>May 28, 2004: 01</revised>
+ <announced>2004-05-28</announced>
+ <revised>2004-05-28: 01</revised>
<bug>49387</bug>
<access>remote </access>
<affected>
@@ -61,15 +60,15 @@
<code>
# emerge sync
- # emerge -pv ">=media-video/mplayer-1.0_pre4"
- # emerge ">=media-video/mplayer-1.0_pre4"
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre4"
+ # emerge "&gt;=media-video/mplayer-1.0_pre4"
- # emerge -pv ">=media-libs/xine-lib-1_rc4"
- # emerge ">=media-libs/xine-lib-1_rc4"</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc4"
+ # emerge "&gt;=media-libs/xine-lib-1_rc4"</code>
</resolution>
<references>
<uri link="http://xinehq.de/index.php/security/XSA-2004-3">Xine security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0433">CAN-2004-0433</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0433">CAN-2004-0433</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200405-25.xml b/glsa-200405-25.xml
index 8ab55fbc..e272bac3 100644
--- a/glsa-200405-25.xml
+++ b/glsa-200405-25.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-25">
<title>tla: Multiple vulnerabilities in included libneon</title>
<synopsis>
tla includes a vulnerable version of the neon library.
</synopsis>
<product type="ebuild">tla</product>
- <announced>May 30, 2004</announced>
- <revised>June 02, 2004: 02</revised>
+ <announced>2004-05-30</announced>
+ <revised>2004-06-02: 02</revised>
<bug>51586</bug>
<access>remote</access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/tla-1.2-r2"
- # emerge ">=dev-util/tla-1.2-r2"</code>
+ # emerge -pv "&gt;=dev-util/tla-1.2-r2"
+ # emerge "&gt;=dev-util/tla-1.2-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-01.xml b/glsa-200406-01.xml
index 2d366422..58cf5788 100644
--- a/glsa-200406-01.xml
+++ b/glsa-200406-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-01">
<title>Ethereal: Multiple security problems</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow an attacker to run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>June 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>51022</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable release.
</p>
@@ -60,15 +59,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/ethereal-0.10.4&quot;
- # emerge &quot;&gt;=net-analyzer/ethereal-0.10.4&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.4"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.4"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00014.html">Ethereal enpa-sa-00014</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504">CVE-2004-0504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505">CVE-2004-0505</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506">CVE-2004-0506</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507">CVE-2004-0507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504">CVE-2004-0504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505">CVE-2004-0505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506">CVE-2004-0506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507">CVE-2004-0507</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-02.xml b/glsa-200406-02.xml
index 163e95b9..dcc9c2fe 100644
--- a/glsa-200406-02.xml
+++ b/glsa-200406-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-02">
<title>tripwire: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
circumstances has been found.
</synopsis>
<product type="ebuild">tripwire</product>
- <announced>June 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52945</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/tripwire-2.3.1.2-r1&quot;
- # emerge &quot;&gt;=app-admin/tripwire-2.3.1.2-r1&quot;</code>
+ # emerge -pv "&gt;=app-admin/tripwire-2.3.1.2-r1"
+ # emerge "&gt;=app-admin/tripwire-2.3.1.2-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/365036/2004-05-31/2004-06-06/0">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0536">CVE-2004-0536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0536">CVE-2004-0536</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-03.xml b/glsa-200406-03.xml
index 126a845f..1b5c88db 100644
--- a/glsa-200406-03.xml
+++ b/glsa-200406-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-03">
<title>sitecopy: Multiple vulnerabilities in included libneon</title>
<synopsis>
sitecopy includes a vulnerable version of the neon library.
</synopsis>
<product type="ebuild">sitecopy</product>
- <announced>June 05, 2004</announced>
- <revised>August 15, 2004: 04</revised>
+ <announced>2004-06-05</announced>
+ <revised>2004-08-15: 04</revised>
<bug>51585</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/sitecopy-0.13.4-r2"
- # emerge ">=net-misc/sitecopy-0.13.4-r2"</code>
+ # emerge -pv "&gt;=net-misc/sitecopy-0.13.4-r2"
+ # emerge "&gt;=net-misc/sitecopy-0.13.4-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-04.xml b/glsa-200406-04.xml
index 2e181887..30bd7136 100644
--- a/glsa-200406-04.xml
+++ b/glsa-200406-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-04">
<title>Mailman: Member password disclosure vulnerability</title>
<synopsis>
Mailman contains a bug allowing 3rd parties to retrieve member passwords.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>June 09, 2004</announced>
- <revised>June 09, 2004: 01</revised>
+ <announced>2004-06-09</announced>
+ <revised>2004-06-09: 01</revised>
<bug>51671</bug>
<access>remote </access>
<affected>
@@ -47,12 +46,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/mailman-2.1.5"
- # emerge ">=net-mail/mailman-2.1.5"</code>
+ # emerge -pv "&gt;=net-mail/mailman-2.1.5"
+ # emerge "&gt;=net-mail/mailman-2.1.5"</code>
</resolution>
<references>
- <uri link="http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html">Mailman 2.1.5 Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0412">CAN-2004-0412</uri>
+ <uri link="https://mail.python.org/pipermail/mailman-announce/2004-May/000072.html">Mailman 2.1.5 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0412">CAN-2004-0412</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-05.xml b/glsa-200406-05.xml
index d040d8af..56b11533 100644
--- a/glsa-200406-05.xml
+++ b/glsa-200406-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-05">
<title>Apache: Buffer overflow in mod_ssl</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache is configured a certain way.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>June 09, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-06-09</announced>
+ <revised>2007-12-30: 03</revised>
<bug>51368</bug>
<access>remote</access>
<affected>
@@ -42,7 +41,7 @@
<p>
Given the right server configuration, an attacker could cause a Denial of
Service or execute code as the user running Apache, usually
- &quot;apache&quot;. It is thought to be impossible to exploit this to
+ "apache". It is thought to be impossible to exploit this to
execute code on the x86 platform, but the possibility for other platforms
is unknown. This does not preclude a DoS on x86 systems.
</p>
@@ -60,19 +59,19 @@
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.18"
- # emerge ">=net-www/mod_ssl-2.8.18"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.18"
+ # emerge "&gt;=net-www/mod_ssl-2.8.18"</code>
<p>
Apache 2.x users should upgrade to the latest version of Apache:
</p>
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.49-r3"
- # emerge ">=www-servers/apache-2.0.49-r3"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.49-r3"
+ # emerge "&gt;=www-servers/apache-2.0.49-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488">CAN-2004-0488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488">CAN-2004-0488</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/glsa-200406-06.xml b/glsa-200406-06.xml
index bb2d802e..ac1c3ca6 100644
--- a/glsa-200406-06.xml
+++ b/glsa-200406-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-06">
<title>CVS: additional DoS and arbitrary code execution vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
an attacker to remotely compromise a CVS server.
</synopsis>
<product type="ebuild">CVS</product>
- <announced>June 10, 2004</announced>
- <revised>June 10, 2004: 01</revised>
+ <announced>2004-06-10</announced>
+ <revised>2004-06-10: 01</revised>
<bug>53408</bug>
<access>remote</access>
<affected>
@@ -31,8 +30,8 @@
vulnerabilities including:
</p>
<ul>
- <li>no-null-termination of &quot;Entry&quot; lines</li>
- <li>error_prog_name &quot;double-free()&quot;</li>
+ <li>no-null-termination of "Entry" lines</li>
+ <li>error_prog_name "double-free()"</li>
<li>Argument integer overflow</li>
<li>serve_notify() out of bounds writes</li>
</ul>
@@ -56,15 +55,15 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/cvs-1.11.17"
- # emerge ">=dev-util/cvs-1.11.17"</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.17"
+ # emerge "&gt;=dev-util/cvs-1.11.17"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/092004.html">E-matters Advisory 09/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414">CAN-2004-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416">CAN-2004-0416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417">CAN-2004-0417</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418">CAN-2004-0418</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414">CAN-2004-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416">CAN-2004-0416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417">CAN-2004-0417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418">CAN-2004-0418</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-07.xml b/glsa-200406-07.xml
index 3d1006b1..bbd13804 100644
--- a/glsa-200406-07.xml
+++ b/glsa-200406-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-07">
<title>Subversion: Remote heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploitable to execute arbitrary code on the server running svnserve.
</synopsis>
<product type="ebuild">dev-util/subversion</product>
- <announced>June 10, 2004</announced>
- <revised>June 10, 2004: 01</revised>
+ <announced>2004-06-10</announced>
+ <revised>2004-06-10: 01</revised>
<access>remote</access>
<affected>
<package name="dev-util/subversion" auto="yes" arch="*">
@@ -19,8 +18,8 @@
</affected>
<background>
<p>
- Subversion is a revision control system that aims to be a &quot;compelling
- replacement for CVS&quot;. It enjoys wide use in the open source community.
+ Subversion is a revision control system that aims to be a "compelling
+ replacement for CVS". It enjoys wide use in the open source community.
svnserve allows access to Subversion repositories using URIs with the
svn://, svn+ssh://, and other tunelled svn+*:// protocols.
</p>
@@ -58,11 +57,11 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/subversion-1.0.4-r1"
- # emerge ">=dev-util/subversion-1.0.4-r1"</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.4-r1"
+ # emerge "&gt;=dev-util/subversion-1.0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0413">CAN-2004-0413</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0413">CAN-2004-0413</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/glsa-200406-08.xml b/glsa-200406-08.xml
index e723d036..78c12c63 100644
--- a/glsa-200406-08.xml
+++ b/glsa-200406-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-08">
<title>Squirrelmail: Another XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise of webmail accounts.
</synopsis>
<product type="ebuild">Squirrelmail</product>
- <announced>June 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52434</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-client/squirrelmail-1.4.3&quot;
- # emerge &quot;&gt;=mail-client/squirrelmail-1.4.3&quot;</code>
+ # emerge -pv "&gt;=mail-client/squirrelmail-1.4.3"
+ # emerge "&gt;=mail-client/squirrelmail-1.4.3"</code>
</resolution>
<references>
<uri link="http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt">RS-Labs Advisory</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0520">CVE-2004-0520</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0520">CVE-2004-0520</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-09.xml b/glsa-200406-09.xml
index 267a461a..b0e6b0e5 100644
--- a/glsa-200406-09.xml
+++ b/glsa-200406-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-09">
<title>Horde-Chora: Remote code execution</title>
<synopsis>
A vulnerability in Chora allows remote code execution and file upload.
</synopsis>
<product type="ebuild">www-apps/horde-chora</product>
- <announced>June 15, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2007-12-30: 02</revised>
<bug>53800</bug>
<access>remote</access>
<affected>
@@ -49,8 +48,8 @@
<code>
# emerge sync
- # emerge -pv ">=www-apps/horde-chora-1.2.2"
- # emerge ">=www-apps/horde-chora-1.2.2"</code>
+ # emerge -pv "&gt;=www-apps/horde-chora-1.2.2"
+ # emerge "&gt;=www-apps/horde-chora-1.2.2"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/102004.html">e-matters Advisory</uri>
diff --git a/glsa-200406-10.xml b/glsa-200406-10.xml
index 3d659ed4..78647b22 100644
--- a/glsa-200406-10.xml
+++ b/glsa-200406-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-10">
<title>Gallery: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allow an attacker to gain administrator privileges within Gallery.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>June 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52798</bug>
<access>remote</access>
<affected>
@@ -53,12 +52,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/gallery-1.4.3_p2&quot;
- # emerge &quot;&gt;=www-apps/gallery-1.4.3_p2&quot;</code>
+ # emerge -pv "&gt;=www-apps/gallery-1.4.3_p2"
+ # emerge "&gt;=www-apps/gallery-1.4.3_p2"</code>
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=123&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0522">CVE-2004-0522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0522">CVE-2004-0522</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/glsa-200406-11.xml b/glsa-200406-11.xml
index f24263da..bde9abcc 100644
--- a/glsa-200406-11.xml
+++ b/glsa-200406-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-11">
<title>Horde-IMP: Input validation vulnerability</title>
<synopsis>
An input validation vulnerability has been discovered in Horde-IMP.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>June 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53862</bug>
<access>remote</access>
<affected>
@@ -49,12 +48,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/horde-imp-3.2.4&quot;
- # emerge &quot;&gt;=www-apps/horde-imp-3.2.4&quot;</code>
+ # emerge -pv "&gt;=www-apps/horde-imp-3.2.4"
+ # emerge "&gt;=www-apps/horde-imp-3.2.4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10501">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0584">CVE-2004-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0584">CVE-2004-0584</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-12.xml b/glsa-200406-12.xml
index b1c8807a..3838de00 100644
--- a/glsa-200406-12.xml
+++ b/glsa-200406-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-12">
<title>Webmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack and information disclosure.
</synopsis>
<product type="ebuild">webmin</product>
- <announced>June 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53375</bug>
<access>remote</access>
<affected>
@@ -52,14 +51,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/app-admin/webmin-1.150&quot;
- # emerge &quot;&gt;=app-admin/app-admin/webmin-1.150&quot;</code>
+ # emerge -pv "&gt;=app-admin/app-admin/webmin-1.150"
+ # emerge "&gt;=app-admin/app-admin/webmin-1.150"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10474">Bugtraq Announcement</uri>
<uri link="http://www.webmin.com/changes-1.150.html">Webmin Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0582">CVE-2004-0582</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0582">CVE-2004-0582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-13.xml b/glsa-200406-13.xml
index 05971048..b1225bd5 100644
--- a/glsa-200406-13.xml
+++ b/glsa-200406-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-13">
<title>Squid: NTLM authentication helper buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
variable.
</synopsis>
<product type="ebuild">squid</product>
- <announced>June 17, 2004</announced>
- <revised>September 02, 2004: 02</revised>
+ <announced>2004-06-17</announced>
+ <revised>2004-09-02: 02</revised>
<bug>53367</bug>
<access>remote</access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-proxy/squid-2.5.5-r2"
- # emerge ">=net-proxy/squid-2.5.5-r2"</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.5-r2"
+ # emerge "&gt;=net-proxy/squid-2.5.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0541">CAN-2004-0541</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0541">CAN-2004-0541</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-14.xml b/glsa-200406-14.xml
index d467a5f5..8072c3d2 100644
--- a/glsa-200406-14.xml
+++ b/glsa-200406-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-14">
<title>aspell: Buffer overflow in word-list-compress</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">aspell</product>
- <announced>June 17, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-06-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>53389</bug>
<access>local</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/aspell-0.50.5-r4&quot;
- # emerge &quot;&gt;=app-text/aspell-0.50.5-r4&quot;</code>
+ # emerge -pv "&gt;=app-text/aspell-0.50.5-r4"
+ # emerge "&gt;=app-text/aspell-0.50.5-r4"</code>
</resolution>
<references>
<uri link="http://nettwerked.mg2.org/advisories/wlc">Nettwerked Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548">CVE-2004-0548</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548">CVE-2004-0548</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-15.xml b/glsa-200406-15.xml
index 3375b00c..f2ccee20 100644
--- a/glsa-200406-15.xml
+++ b/glsa-200406-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-15">
<title>Usermin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack and information disclosure.
</synopsis>
<product type="ebuild">Usermin</product>
- <announced>June 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54030</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/usermin-1.080&quot;
- # emerge &quot;&gt;=app-admin/usermin-1.080&quot;</code>
+ # emerge -pv "&gt;=app-admin/usermin-1.080"
+ # emerge "&gt;=app-admin/usermin-1.080"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10521">Bugtraq Announcement</uri>
<uri link="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html">SNS Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0588">CVE-2004-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0588">CVE-2004-0588</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-16.xml b/glsa-200406-16.xml
index e312b164..dc196c78 100644
--- a/glsa-200406-16.xml
+++ b/glsa-200406-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-16">
<title>Apache 1.3: Buffer overflow in mod_proxy</title>
<synopsis>
@@ -8,8 +7,8 @@
when Apache is configured a certain way.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>June 21, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-06-21</announced>
+ <revised>2007-12-30: 02</revised>
<bug>53544</bug>
<access>remote</access>
<affected>
@@ -38,7 +37,7 @@
<p>
An attacker could cause a Denial of Service as the Apache child handling
the request, which will die and under some circumstances execute arbitrary
- code as the user running Apache, usually &quot;apache&quot;.
+ code as the user running Apache, usually "apache".
</p>
</impact>
<workaround>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-1.3.31-r2"
- # emerge ">=www-servers/apache-1.3.31-r2"</code>
+ # emerge -pv "&gt;=www-servers/apache-1.3.31-r2"
+ # emerge "&gt;=www-servers/apache-1.3.31-r2"</code>
</resolution>
<references>
<uri link="http://www.guninski.com/modproxy1.html">Georgi Guninski security advisory #69, 2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-17.xml b/glsa-200406-17.xml
index cf4baf52..7bc7e678 100644
--- a/glsa-200406-17.xml
+++ b/glsa-200406-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-17">
<title>IPsec-Tools: authentication bug in racoon</title>
<synopsis>
racoon provided as part of IPsec-Tools fails do proper authentication.
</synopsis>
<product type="ebuild">IPsec-Tools</product>
- <announced>June 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53915</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;
- # emerge &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.3.3"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.3.3"</code>
</resolution>
<references>
- <uri link="http://ipsec-tools.sourceforge.net/x509sig.html">IPsec-Tools Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155">CVE-2004-0155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607">CVE-2004-0607</uri>
+ <uri link="https://ipsec-tools.sourceforge.net/x509sig.html">IPsec-Tools Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155">CVE-2004-0155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607">CVE-2004-0607</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-18.xml b/glsa-200406-18.xml
index 24526edb..b293ec71 100644
--- a/glsa-200406-18.xml
+++ b/glsa-200406-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-18">
<title>gzip: Insecure creation of temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>June 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54890</bug>
<access>local</access>
<affected>
@@ -52,8 +51,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/gzip-1.3.3-r4&quot;
- # emerge &quot;&gt;=app-arch/gzip-1.3.3-r4&quot;</code>
+ # emerge -pv "&gt;=app-arch/gzip-1.3.3-r4"
+ # emerge "&gt;=app-arch/gzip-1.3.3-r4"</code>
<p>
Additionally, once the upgrade is complete, all self extracting files
created with earlier versions gzexe should be recreated, since the
@@ -61,7 +60,7 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0603">CVE-2004-0603</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0603">CVE-2004-0603</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-19.xml b/glsa-200406-19.xml
index 56c05acb..90df51d2 100644
--- a/glsa-200406-19.xml
+++ b/glsa-200406-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-19">
<title>giFT-FastTrack: remote denial of service attack</title>
<synopsis>
@@ -8,8 +7,8 @@
giFT-FastTrack plugin will cause the giFT daemon to crash.
</synopsis>
<product type="ebuild">giFT-FastTrack</product>
- <announced>June 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54452</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-p2p/gift-fasttrack-0.8.7&quot;
- # emerge &quot;&gt;=net-p2p/gift-fasttrack-0.8.7&quot;</code>
+ # emerge -pv "&gt;=net-p2p/gift-fasttrack-0.8.7"
+ # emerge "&gt;=net-p2p/gift-fasttrack-0.8.7"</code>
</resolution>
<references>
<uri link="http://gift-fasttrack.berlios.de/">giFT-FastTrack announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0604">CVE-2004-0604</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0604">CVE-2004-0604</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200406-20.xml b/glsa-200406-20.xml
index fcdcabab..03a64e3e 100644
--- a/glsa-200406-20.xml
+++ b/glsa-200406-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-20">
<title>FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling</title>
<synopsis>
@@ -9,8 +8,8 @@
authenticate with a fake certificate.
</synopsis>
<product type="ebuild">Openswan</product>
- <announced>June 25, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-25</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/freeswan" auto="yes" arch="*">
@@ -65,40 +64,40 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/freeswan-1.99-r1&quot;
- # emerge &quot;=net-misc/freeswan-1.99-r1&quot;</code>
+ # emerge -pv "=net-misc/freeswan-1.99-r1"
+ # emerge "=net-misc/freeswan-1.99-r1"</code>
<p>
All FreeS/WAN 2.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/freeswan-2.04-r1&quot;
- # emerge &quot;&gt;=net-misc/freeswan-2.04-r1&quot;</code>
+ # emerge -pv "&gt;=net-misc/freeswan-2.04-r1"
+ # emerge "&gt;=net-misc/freeswan-2.04-r1"</code>
<p>
All Openswan 1.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/openswan-1.0.6_rc1&quot;
- # emerge &quot;=net-misc/openswan-1.0.6_rc1&quot;</code>
+ # emerge -pv "=net-misc/openswan-1.0.6_rc1"
+ # emerge "=net-misc/openswan-1.0.6_rc1"</code>
<p>
All Openswan 2.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/openswan-2.1.4&quot;
- # emerge &quot;&gt;=net-misc/openswan-2.1.4&quot;</code>
+ # emerge -pv "&gt;=net-misc/openswan-2.1.4"
+ # emerge "&gt;=net-misc/openswan-2.1.4"</code>
<p>
All strongSwan users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/strongswan-2.1.3&quot;
- # emerge &quot;&gt;=net-misc/strongswan-2.1.3&quot;</code>
+ # emerge -pv "&gt;=net-misc/strongswan-2.1.3"
+ # emerge "&gt;=net-misc/strongswan-2.1.3"</code>
<p>
All Super-FreeS/WAN users should migrate to the latest stable version
of Openswan. Note that Portage will force a move for Super-FreeS/WAN
@@ -107,12 +106,12 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/openswan-1.0.6_rc1&quot;
- # emerge &quot;=net-misc/openswan-1.0.6_rc1&quot;</code>
+ # emerge -pv "=net-misc/openswan-1.0.6_rc1"
+ # emerge "=net-misc/openswan-1.0.6_rc1"</code>
</resolution>
<references>
- <uri link="http://lists.openswan.org/pipermail/dev/2004-June/000370.html">Openswan/strongSwan Authentication Bug</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0590">CVE-2004-0590</uri>
+ <uri link="https://lists.openswan.org/pipermail/dev/2004-June/000370.html">Openswan/strongSwan Authentication Bug</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0590">CVE-2004-0590</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200406-21.xml b/glsa-200406-21.xml
index c7698df4..d02b3505 100644
--- a/glsa-200406-21.xml
+++ b/glsa-200406-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-21">
<title>mit-krb5: Multiple buffer overflows in krb5_aname_to_localname</title>
<synopsis>
@@ -9,8 +8,8 @@
system compromise.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>June 29, 2004</announced>
- <revised>June 29, 2004: 01</revised>
+ <announced>2004-06-29</announced>
+ <revised>2004-06-29: 01</revised>
<bug>52744</bug>
<access>remote</access>
<affected>
@@ -61,11 +60,11 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/mit-krb5-1.3.3-r1"
- # emerge ">=app-crypt/mit-krb5-1.3.3-r1"</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.3-r1"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523">CAN-2004-0523</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523">CAN-2004-0523</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt">MIT krb5 Security Advisory</uri>
</references>
<metadata tag="submitter">
diff --git a/glsa-200406-22.xml b/glsa-200406-22.xml
index adedc54c..5ff727bd 100644
--- a/glsa-200406-22.xml
+++ b/glsa-200406-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-22">
<title>Pavuk: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">Pavuk</product>
- <announced>June 30, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-30</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/pavuk" auto="yes" arch="*">
@@ -48,11 +47,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/pavuk-0.9.28-r2&quot;
- # emerge &quot;&gt;=&quot;net-misc/pavuk-0.9.28-r2</code>
+ # emerge -pv "&gt;=net-misc/pavuk-0.9.28-r2"
+ # emerge "&gt;="net-misc/pavuk-0.9.28-r2</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0456">CVE-2004-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0456">CVE-2004-0456</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-01.xml b/glsa-200407-01.xml
index 508b29e9..ff68388d 100644
--- a/glsa-200407-01.xml
+++ b/glsa-200407-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-01">
<title>Esearch: Insecure temp file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">esearch</product>
- <announced>July 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55424</bug>
<access>local</access>
<affected>
@@ -56,11 +55,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-portage/esearch-0.6.2&quot;
- # emerge &quot;&gt;=app-portage/esearch-0.6.2&quot;</code>
+ # emerge -pv "&gt;=app-portage/esearch-0.6.2"
+ # emerge "&gt;=app-portage/esearch-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0655">CVE-2004-0655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0655">CVE-2004-0655</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/glsa-200407-02.xml b/glsa-200407-02.xml
index 09a0f02e..fe44d7c0 100644
--- a/glsa-200407-02.xml
+++ b/glsa-200407-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-02">
<title>Linux Kernel: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
released and details are included in this advisory.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 03, 2004</announced>
- <revised>March 27, 2011: 04</revised>
+ <announced>2004-07-03</announced>
+ <revised>2011-03-27: 04</revised>
<bug>47881</bug>
<bug>49637</bug>
<bug>53804</bug>
@@ -300,19 +299,19 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0109">CVE-2004-0109</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0133">CVE-2004-0133</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0177">CVE-2004-0177</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0178">CVE-2004-0178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0181">CVE-2004-0181</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0228">CVE-2004-0228</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0229">CVE-2004-0229</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394">CVE-2004-0394</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427">CVE-2004-0427</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0495">CVE-2004-0495</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0535">CVE-2004-0535</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554">CVE-2004-0554</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1983">CVE-2004-1983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0109">CVE-2004-0109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0133">CVE-2004-0133</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0177">CVE-2004-0177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0178">CVE-2004-0178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0181">CVE-2004-0181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0228">CVE-2004-0228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0229">CVE-2004-0229</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394">CVE-2004-0394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427">CVE-2004-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0495">CVE-2004-0495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0535">CVE-2004-0535</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554">CVE-2004-0554</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1983">CVE-2004-1983</uri>
</references>
<metadata tag="submitter">
plasmaroo
diff --git a/glsa-200407-03.xml b/glsa-200407-03.xml
index ddf00eb8..2554ce37 100644
--- a/glsa-200407-03.xml
+++ b/glsa-200407-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-03">
<title>Apache 2: Remote denial of service attack</title>
<synopsis>
@@ -9,8 +8,8 @@
overflow.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>July 04, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-07-04</announced>
+ <revised>2007-12-30: 02</revised>
<bug>55441</bug>
<access>remote</access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.49-r4"
- # emerge ">=www-servers/apache-2.0.49-r4"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.49-r4"
+ # emerge "&gt;=www-servers/apache-2.0.49-r4"</code>
</resolution>
<references>
<uri link="http://www.guninski.com/httpd1.html">Georgi Guninski security advisory #70, 2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493">CAN-2004-0493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493">CAN-2004-0493</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-04.xml b/glsa-200407-04.xml
index 9db02bb1..47efc8c8 100644
--- a/glsa-200407-04.xml
+++ b/glsa-200407-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-04">
<title>Pure-FTPd: Potential DoS when maximum connections is reached</title>
<synopsis>
@@ -8,8 +7,8 @@
when the maximum number of connections is reached.
</synopsis>
<product type="ebuild">Pure-FTPd</product>
- <announced>July 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54590</bug>
<access>remote</access>
<affected>
@@ -49,12 +48,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-ftp/pure-ftpd-1.0.18-r1&quot;
- # emerge &quot;&gt;=net-ftp/pure-ftpd-1.0.18-r1&quot;</code>
+ # emerge -pv "&gt;=net-ftp/pure-ftpd-1.0.18-r1"
+ # emerge "&gt;=net-ftp/pure-ftpd-1.0.18-r1"</code>
</resolution>
<references>
<uri link="http://www.pureftpd.org">Pure-FTPd website</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0656">CVE-2004-0656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0656">CVE-2004-0656</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-05.xml b/glsa-200407-05.xml
index 461f99b3..e4cf0bb6 100644
--- a/glsa-200407-05.xml
+++ b/glsa-200407-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-05">
<title>XFree86, X.org: XDM ignores requestPort setting</title>
<synopsis>
@@ -10,8 +9,8 @@
configured XDM to refuse such connections.
</synopsis>
<product type="ebuild">xdm</product>
- <announced>July 05, 2004</announced>
- <revised>July 05, 2004: 01</revised>
+ <announced>2004-07-05</announced>
+ <revised>2004-07-05: 01</revised>
<bug>53226</bug>
<access>remote</access>
<affected>
@@ -60,19 +59,19 @@
<code>
# emerge sync
- # emerge -pv ">=x11-base/xfree-4.3.0-r6"
- # emerge ">=x11-base/xfree-4.3.0-r6"</code>
+ # emerge -pv "&gt;=x11-base/xfree-4.3.0-r6"
+ # emerge "&gt;=x11-base/xfree-4.3.0-r6"</code>
<p>
If you are using X.org's X11 server, you should run the following:
</p>
<code>
# emerge sync
- # emerge -pv ">=x11-base/xorg-x11-6.7.0-r1"
- # emerge ">=x11-base/xorg-x11-6.7.0-r1"</code>
+ # emerge -pv "&gt;=x11-base/xorg-x11-6.7.0-r1"
+ # emerge "&gt;=x11-base/xorg-x11-6.7.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0419">CAN 2004-0419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0419">CAN 2004-0419</uri>
<uri link="http://bugs.xfree86.org/show_bug.cgi?id=1376">XFree86 Bug</uri>
</references>
<metadata tag="submitter">
diff --git a/glsa-200407-06.xml b/glsa-200407-06.xml
index d304d0d7..5142b92f 100644
--- a/glsa-200407-06.xml
+++ b/glsa-200407-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-06">
<title>libpng: Buffer overflow on row buffers</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>July 08, 2004</announced>
- <revised>July 08, 2004: 01</revised>
+ <announced>2004-07-08</announced>
+ <revised>2004-07-08: 01</revised>
<bug>56307</bug>
<access>remote</access>
<affected>
@@ -54,8 +53,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r7"
- # emerge ">=media-libs/libpng-1.2.5-r7"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r7"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r7"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -64,7 +63,7 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363">CAN-2002-1363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363">CAN-2002-1363</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-07.xml b/glsa-200407-07.xml
index 9ce491bb..b3a06999 100644
--- a/glsa-200407-07.xml
+++ b/glsa-200407-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-07">
<title>Shorewall : Insecure temp file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary system files.
</synopsis>
<product type="ebuild">Shorewall</product>
- <announced>July 08, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-08</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55675</bug>
<access>local</access>
<affected>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;
- # emerge &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;</code>
+ # emerge -pv "&gt;=net-firewall/shorewall-1.4.10f"
+ # emerge "&gt;=net-firewall/shorewall-1.4.10f"</code>
</resolution>
<references>
<uri link="http://lists.shorewall.net/pipermail/shorewall-announce/2004-June/000385.html">Shorewall Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0647">CVE-2004-0647</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0647">CVE-2004-0647</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-08.xml b/glsa-200407-08.xml
index 8235ab9f..0232aaa6 100644
--- a/glsa-200407-08.xml
+++ b/glsa-200407-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-08">
<title>Ethereal: Multiple security problems</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow an attacker to run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>July 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56423</bug>
<access>remote</access>
<affected>
@@ -47,7 +46,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. For SMB you can disable SID snooping in the SMB
protocol preference. However, it is strongly recommended to upgrade to
the latest stable version.
@@ -60,14 +59,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/ethereal-0.10.5&quot;
- # emerge &quot;&gt;=net-analyzer/ethereal-0.10.5&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.5"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.5"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00015.html">Ethereal enpa-sa-00015</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633">CVE-2004-0633</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0634">CVE-2004-0634</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635">CVE-2004-0635</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633">CVE-2004-0633</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0634">CVE-2004-0634</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635">CVE-2004-0635</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-09.xml b/glsa-200407-09.xml
index 922025f9..2ef4d2f0 100644
--- a/glsa-200407-09.xml
+++ b/glsa-200407-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-09">
<title>MoinMoin: Group ACL bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
Control Lists).
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>July 11, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53126</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/moinmoin-1.2.2&quot;
- # emerge &quot;&gt;=www-apps/moinmoin-1.2.2&quot;</code>
+ # emerge -pv "&gt;=www-apps/moinmoin-1.2.2"
+ # emerge "&gt;=www-apps/moinmoin-1.2.2"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482">MoinMoin Announcement</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482">MoinMoin Announcement</uri>
<uri link="http://www.osvdb.org/6704">OSVDB Entry</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0708">CVE-2004-0708</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0708">CVE-2004-0708</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-10.xml b/glsa-200407-10.xml
index 368fa89e..a7a76bac 100644
--- a/glsa-200407-10.xml
+++ b/glsa-200407-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-10">
<title>rsync: Directory traversal in rsync daemon</title>
<synopsis>
@@ -8,8 +7,8 @@
traversal allowing to write files outside a sync module.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>July 12, 2004</announced>
- <revised>July 12, 2004: 01</revised>
+ <announced>2004-07-12</announced>
+ <revised>2004-07-12: 01</revised>
<bug>49534</bug>
<access>remote</access>
<affected>
@@ -57,11 +56,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/rsync-2.6.0-r2"
- # emerge ">=net-misc/rsync-2.6.0-r2"</code>
+ # emerge -pv "&gt;=net-misc/rsync-2.6.0-r2"
+ # emerge "&gt;=net-misc/rsync-2.6.0-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0426">CAN-2004-0426</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0426">CAN-2004-0426</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200407-11.xml b/glsa-200407-11.xml
index a9f9b585..4bc5da95 100644
--- a/glsa-200407-11.xml
+++ b/glsa-200407-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-11">
<title>wv: Buffer overflow vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
the vulnerable application.
</synopsis>
<product type="ebuild">app-text/wv</product>
- <announced>July 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56595</bug>
<access>remote</access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/wv-1.0.0-r1&quot;
- # emerge &quot;&gt;=app-text/wv-1.0.0-r1&quot;</code>
+ # emerge -pv "&gt;=app-text/wv-1.0.0-r1"
+ # emerge "&gt;=app-text/wv-1.0.0-r1"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=115&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0645">CVE-2004-0645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0645">CVE-2004-0645</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/glsa-200407-12.xml b/glsa-200407-12.xml
index e5b17646..05c22c78 100644
--- a/glsa-200407-12.xml
+++ b/glsa-200407-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-12">
<title>Linux Kernel: Remote DoS vulnerability with IPTables TCP Handling</title>
<synopsis>
@@ -9,8 +8,8 @@
possibly enter an infinite loop and hang the vulnerable machine.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 14, 2004</announced>
- <revised>October 10, 2004: 02</revised>
+ <announced>2004-07-14</announced>
+ <revised>2004-10-10: 02</revised>
<bug>55694</bug>
<access>remote</access>
<affected>
@@ -125,7 +124,7 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0626">CAN-2004-0626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0626">CAN-2004-0626</uri>
</references>
<metadata tag="submitter">
plasmaroo
diff --git a/glsa-200407-13.xml b/glsa-200407-13.xml
index b0d43fcd..7fc892cb 100644
--- a/glsa-200407-13.xml
+++ b/glsa-200407-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-13">
<title>PHP: Multiple security vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution, were found and fixed in PHP.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>July 15, 2004</announced>
- <revised>July 15, 2004: 01</revised>
+ <announced>2004-07-15</announced>
+ <revised>2004-07-15: 01</revised>
<bug>56985</bug>
<access>remote</access>
<affected>
@@ -70,18 +69,18 @@
<code>
# emerge sync
- # emerge -pv ">=dev-php/php-4.3.8"
- # emerge ">=dev-php/php-4.3.8"
+ # emerge -pv "&gt;=dev-php/php-4.3.8"
+ # emerge "&gt;=dev-php/php-4.3.8"
- # emerge -pv ">=dev-php/mod_php-4.3.8"
- # emerge ">=dev-php/mod_php-4.3.8"
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.8"
+ # emerge "&gt;=dev-php/mod_php-4.3.8"
- # emerge -pv ">=dev-php/php-cgi-4.3.8"
- # emerge ">=dev-php/php-cgi-4.3.8"</code>
+ # emerge -pv "&gt;=dev-php/php-cgi-4.3.8"
+ # emerge "&gt;=dev-php/php-cgi-4.3.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</uri>
<uri link="http://security.e-matters.de/advisories/112004.html">E-Matters Advisory 11/2004</uri>
<uri link="http://security.e-matters.de/advisories/122004.html">E-Matters Advisory 12/2004</uri>
</references>
diff --git a/glsa-200407-14.xml b/glsa-200407-14.xml
index 87dcd762..26ada078 100644
--- a/glsa-200407-14.xml
+++ b/glsa-200407-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-14">
<title>Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries</title>
<synopsis>
@@ -8,8 +7,8 @@
execution through malformed 'secure' queries.
</synopsis>
<product type="ebuild">Unreal Tournament</product>
- <announced>July 19, 2004</announced>
- <revised>July 19, 2004: 01</revised>
+ <announced>2004-07-19</announced>
+ <revised>2004-07-19: 01</revised>
<bug>54726</bug>
<access>remote</access>
<affected>
@@ -67,21 +66,21 @@
<code>
# emerge sync
- # emerge -pv ">=games-fps/ut2003-2225-r3"
- # emerge ">=games-fps/ut2003-2225-r3"
+ # emerge -pv "&gt;=games-fps/ut2003-2225-r3"
+ # emerge "&gt;=games-fps/ut2003-2225-r3"
- # emerge -pv ">=games-server/ut2003-ded-2225-r2"
- # emerge ">=games-server/ut2003-ded-2225-r2"
+ # emerge -pv "&gt;=games-server/ut2003-ded-2225-r2"
+ # emerge "&gt;=games-server/ut2003-ded-2225-r2"
- # emerge -pv ">=games-fps/ut2004-3236"
- # emerge ">=games-fps/ut2004-3236"
+ # emerge -pv "&gt;=games-fps/ut2004-3236"
+ # emerge "&gt;=games-fps/ut2004-3236"
- # emerge -pv ">=games-fps/ut2004-demo-3120-r4"
- # emerge ">=games-fps/ut2004-demo-3120-r4"</code>
+ # emerge -pv "&gt;=games-fps/ut2004-demo-3120-r4"
+ # emerge "&gt;=games-fps/ut2004-demo-3120-r4"</code>
</resolution>
<references>
<uri link="http://aluigi.altervista.org/adv/unsecure-adv.txt">Luigi Auriemma advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0608">CAN-2004-0608</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0608">CAN-2004-0608</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/glsa-200407-15.xml b/glsa-200407-15.xml
index 506b6383..8d9b2c42 100644
--- a/glsa-200407-15.xml
+++ b/glsa-200407-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-15">
<title>Opera: Multiple spoofing vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
injection.
</synopsis>
<product type="ebuild">opera</product>
- <announced>July 20, 2004</announced>
- <revised>July 20, 2004: 01</revised>
+ <announced>2004-07-20</announced>
+ <revised>2004-07-20: 01</revised>
<bug>56311</bug>
<bug>56109</bug>
<access>remote</access>
@@ -54,14 +53,14 @@
<code>
# emerge sync
- # emerge -pv ">=www-client/opera-7.53"
- # emerge ">=www-client/opera-7.53"</code>
+ # emerge -pv "&gt;=www-client/opera-7.53"
+ # emerge "&gt;=www-client/opera-7.53"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10517">Bugtraq Announcement</uri>
- <uri link="http://secunia.com/advisories/11978/">Secunia Advisory SA11978</uri>
- <uri link="http://secunia.com/advisories/12028/">Secunia Advisory SA12028</uri>
- <uri link="http://www.opera.com/linux/changelogs/753/">Opera Changelog</uri>
+ <uri link="https://secunia.com/advisories/11978/">Secunia Advisory SA11978</uri>
+ <uri link="https://secunia.com/advisories/12028/">Secunia Advisory SA12028</uri>
+ <uri link="https://www.opera.com/linux/changelogs/753/">Opera Changelog</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-16.xml b/glsa-200407-16.xml
index 65465868..36f8a298 100644
--- a/glsa-200407-16.xml
+++ b/glsa-200407-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-16">
<title>Linux Kernel: Multiple DoS and permission vulnerabilities</title>
<synopsis>
@@ -14,8 +13,8 @@
advisory.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 22, 2004</announced>
- <revised>March 27, 2011: 03</revised>
+ <announced>2004-07-22</announced>
+ <revised>2011-03-27: 03</revised>
<bug>56171</bug>
<bug>56479</bug>
<access>local</access>
@@ -287,10 +286,10 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0447">CAN-2004-0447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0496">CAN-2004-0496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0497">CAN-2004-0497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565">CAN-2004-0565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0447">CAN-2004-0447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0496">CAN-2004-0496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0497">CAN-2004-0497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565">CAN-2004-0565</uri>
<uri link="http://www.securityfocus.com/archive/1/367977">VServer /proc Context Vulnerability</uri>
</references>
<metadata tag="submitter">
diff --git a/glsa-200407-17.xml b/glsa-200407-17.xml
index 4f68a977..1241478a 100644
--- a/glsa-200407-17.xml
+++ b/glsa-200407-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-17">
<title>l2tpd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
known whether this bug is exploitable.
</synopsis>
<product type="ebuild">net-dialup/l2tpd</product>
- <announced>July 22, 2004</announced>
- <revised>July 22, 2004: 01</revised>
+ <announced>2004-07-22</announced>
+ <revised>2004-07-22: 01</revised>
<bug>53009</bug>
<access>remote</access>
<affected>
@@ -48,11 +47,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-l2tpd-0.69-r2"
- # emerge ">=net-l2tpd-0.69-r2"</code>
+ # emerge -pv "&gt;=net-l2tpd-0.69-r2"
+ # emerge "&gt;=net-l2tpd-0.69-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0649">CAN-2004-0649</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0649">CAN-2004-0649</uri>
<uri link="http://seclists.org/lists/fulldisclosure/2004/Jun/0094.html">Full Disclosure Report</uri>
</references>
<metadata tag="requester">
diff --git a/glsa-200407-18.xml b/glsa-200407-18.xml
index b7e4e740..d35b3cc2 100644
--- a/glsa-200407-18.xml
+++ b/glsa-200407-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-18">
<title>mod_ssl: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache is configured to use mod_ssl and mod_proxy.
</synopsis>
<product type="ebuild">mod_ssl</product>
- <announced>July 22, 2004</announced>
- <revised>July 22, 2004: 01</revised>
+ <announced>2004-07-22</announced>
+ <revised>2004-07-22: 01</revised>
<bug>57379</bug>
<access>remote</access>
<affected>
@@ -33,7 +32,7 @@
<impact type="normal">
<p>
Given the right server configuration, an attacker could execute code as the
- user running Apache, usually &quot;apache&quot;.
+ user running Apache, usually "apache".
</p>
</impact>
<workaround>
@@ -49,8 +48,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.19"
- # emerge ">=net-www/mod_ssl-2.8.19"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.19"
+ # emerge "&gt;=net-www/mod_ssl-2.8.19"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=apache-modssl&amp;m=109001100906749&amp;w=2">mod_ssl Announcement</uri>
diff --git a/glsa-200407-19.xml b/glsa-200407-19.xml
index 6d2307e2..d2e7dbd0 100644
--- a/glsa-200407-19.xml
+++ b/glsa-200407-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-19">
<title>Pavuk: Digest authentication helper buffer overflow</title>
<synopsis>
Pavuk contains a bug that can allow an attacker to run arbitrary code.
</synopsis>
<product type="ebuild">Pavuk</product>
- <announced>July 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-26</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/pavuk" auto="yes" arch="*">
@@ -46,11 +45,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;
- # emerge &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;</code>
+ # emerge -pv "&gt;=net-misc/pavuk-0.9.28-r3"
+ # emerge "&gt;=net-misc/pavuk-0.9.28-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1437">CVE-2004-1437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1437">CVE-2004-1437</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200407-20.xml b/glsa-200407-20.xml
index 7927c96f..393b01ca 100644
--- a/glsa-200407-20.xml
+++ b/glsa-200407-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-20">
<title>Subversion: Vulnerability in mod_authz_svn</title>
<synopsis>
@@ -9,8 +8,8 @@
wish.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>July 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57747</bug>
<access>remote</access>
<affected>
@@ -64,12 +63,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/subversion-1.0.6&quot;
- # emerve &quot;&gt;=dev-util/subversion-1.0.6&quot;</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.6"
+ # emerve "&gt;=dev-util/subversion-1.0.6"</code>
</resolution>
<references>
<uri link="http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES">ChangeLog for Subversion 1.0.6</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1438">CVE-2004-1438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1438">CVE-2004-1438</uri>
</references>
<metadata tag="requester">
koon
diff --git a/glsa-200407-21.xml b/glsa-200407-21.xml
index 0bb44c77..b3b2a97e 100644
--- a/glsa-200407-21.xml
+++ b/glsa-200407-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-21">
<title>Samba: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>July 29, 2004</announced>
- <revised>July 29, 2004: 02</revised>
+ <announced>2004-07-29</announced>
+ <revised>2004-07-29: 02</revised>
<bug>57962</bug>
<access>remote</access>
<affected>
@@ -59,13 +58,13 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.5"
- # emerge ">=net-fs/samba-3.0.5"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.5"
+ # emerge "&gt;=net-fs/samba-3.0.5"</code>
</resolution>
<references>
- <uri link="http://www.samba.org/samba/whatsnew/samba-3.0.5.html">Samba 3.0.5 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600">CAN-2004-0600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CAN-2004-0686</uri>
+ <uri link="https://www.samba.org/samba/whatsnew/samba-3.0.5.html">Samba 3.0.5 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600">CAN-2004-0600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CAN-2004-0686</uri>
</references>
<metadata tag="requester">
koon
diff --git a/glsa-200407-22.xml b/glsa-200407-22.xml
index 84a89f01..5f5a8a03 100644
--- a/glsa-200407-22.xml
+++ b/glsa-200407-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-22">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
PHP code.
</synopsis>
<product type="ebuild">dev-db/phpmyadmin</product>
- <announced>July 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57890</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/phpmyadmin-2.5.7_p1&quot;
- # emerge &quot;&gt;=dev-db/phpmyadmin-2.5.7_p1&quot;</code>
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.5.7_p1"
+ # emerge "&gt;=dev-db/phpmyadmin-2.5.7_p1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/367486">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2631">CVE-2004-2631</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2632">CVE-2004-2632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2631">CVE-2004-2631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2632">CVE-2004-2632</uri>
</references>
<metadata tag="requester">
koon
diff --git a/glsa-200407-23.xml b/glsa-200407-23.xml
index dd782192..6f197d1a 100644
--- a/glsa-200407-23.xml
+++ b/glsa-200407-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-23">
<title>SoX: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">SoX</product>
- <announced>July 30, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>58733</bug>
<access>remote</access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-sound/sox-12.17.4-r2&quot;
- # emerge &quot;&gt;=media-sound/sox-12.17.4-r2&quot;</code>
+ # emerge -pv "&gt;=media-sound/sox-12.17.4-r2"
+ # emerge "&gt;=media-sound/sox-12.17.4-r2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1141.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557">CVE-2004-0557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557">CVE-2004-0557</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/glsa-200408-01.xml b/glsa-200408-01.xml
index e9595f4e..fabb5c22 100644
--- a/glsa-200408-01.xml
+++ b/glsa-200408-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-01">
<title>MPlayer: GUI filename handling overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploitable buffer overflow attack.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>August 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55456</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre4-r7&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre4-r7&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre4-r7"
+ # emerge "&gt;=media-video/mplayer-1.0_pre4-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10615/">Bugtraq Announcement</uri>
<uri link="http://www.open-security.org/advisories/5">Open-Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0659">CVE-2004-0659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0659">CVE-2004-0659</uri>
</references>
<metadata tag="requester">
koon
diff --git a/glsa-200408-02.xml b/glsa-200408-02.xml
index 52b3a9e2..f9168c3f 100644
--- a/glsa-200408-02.xml
+++ b/glsa-200408-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-02">
<title>Courier: Cross-site scripting vulnerability in SqWebMail</title>
<synopsis>
@@ -8,8 +7,8 @@
to cross-site scripting attacks.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>August 04, 2004</announced>
- <revised>August 04, 2004: 01</revised>
+ <announced>2004-08-04</announced>
+ <revised>2004-08-04: 01</revised>
<bug>58020</bug>
<access>remote</access>
<affected>
@@ -55,17 +54,17 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/courier-0.45.6.20040618"
- # emerge ">=mail-mta/courier-0.45.6.20040618"</code>
+ # emerge -pv "&gt;=mail-mta/courier-0.45.6.20040618"
+ # emerge "&gt;=mail-mta/courier-0.45.6.20040618"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0591">CAN-2004-0591</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">XSS definition</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0591">CAN-2004-0591</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">XSS definition</uri>
</references>
<metadata tag="requester">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 3 Aug 2004 15:23:08 +0000">
+ <metadata tag="submitter" timestamp="2004-08-03T15:23:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200408-03.xml b/glsa-200408-03.xml
index 1432e2ee..421d78b4 100644
--- a/glsa-200408-03.xml
+++ b/glsa-200408-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-03">
<title>libpng: Numerous vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to perform a Denial of Service attack or even execute arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>August 05, 2004</announced>
- <revised>August 05, 2004: 01</revised>
+ <announced>2004-08-05</announced>
+ <revised>2004-08-05: 01</revised>
<bug>59424</bug>
<access>remote</access>
<affected>
@@ -51,8 +50,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r8"
- # emerge ">=media-libs/libpng-1.2.5-r8"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r8"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r8"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -61,11 +60,11 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 09:45:46 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T09:45:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-04.xml b/glsa-200408-04.xml
index 2fe7e7a5..023e62a9 100644
--- a/glsa-200408-04.xml
+++ b/glsa-200408-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-04">
<title>PuTTY: Pre-authentication arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
code on the connecting client.
</synopsis>
<product type="ebuild">PuTTY</product>
- <announced>August 05, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-05</announced>
+ <revised>2006-05-22: 03</revised>
<bug>59383</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/putty-0.55&quot;
- # emerge &quot;&gt;=net-misc/putty-0.55&quot;</code>
+ # emerge -pv "&gt;=net-misc/putty-0.55"
+ # emerge "&gt;=net-misc/putty-0.55"</code>
</resolution>
<references>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=417&amp;idxseccion=10">Corelabs Advisory</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440">CVE-2004-1440</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=417&amp;idxseccion=10">Corelabs Advisory</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440">CVE-2004-1440</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 4 Aug 2004 17:20:53 +0000">
+ <metadata tag="requester" timestamp="2004-08-04T17:20:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 09:03:08 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T09:03:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-05.xml b/glsa-200408-05.xml
index aab6c652..20455548 100644
--- a/glsa-200408-05.xml
+++ b/glsa-200408-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-05">
<title>Opera: Multiple new vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing an attacker to read the local filesystem remotely.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>August 05, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-08-05</announced>
+ <revised>2007-12-30: 03</revised>
<bug>59503</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-client/opera-7.54&quot;
- # emerge &quot;&gt;=www-client/opera-7.54&quot;</code>
+ # emerge -pv "&gt;=www-client/opera-7.54"
+ # emerge "&gt;=www-client/opera-7.54"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/linux/changelogs/754/">Opera Changelog</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754/">Opera Changelog</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html">Address bar spoofing issue disclosure</uri>
<uri link="http://www.greymagic.com/security/advisories/gm008-op/">GreyMagic Security Advisory GM#008-OP</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2570">CVE-2004-2570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2570">CVE-2004-2570</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 18:21:29 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T18:21:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-06.xml b/glsa-200408-06.xml
index deb745c4..ad33013d 100644
--- a/glsa-200408-06.xml
+++ b/glsa-200408-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-06">
<title>SpamAssassin: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
certain malformed messages.
</synopsis>
<product type="ebuild">SpamAssassin</product>
- <announced>August 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59483</bug>
<access>remote</access>
<affected>
@@ -48,17 +47,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-filter/spamassassin-2.64&quot;
- # emerge &quot;&gt;=mail-filter/spamassassin-2.64&quot;</code>
+ # emerge -pv "&gt;=mail-filter/spamassassin-2.64"
+ # emerge "&gt;=mail-filter/spamassassin-2.64"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=spamassassin-announce&amp;m=109168121628767&amp;w=2">SpamAssassin Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0796">CVE-2004-0796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0796">CVE-2004-0796</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 09:14:09 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T09:14:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 11:01:34 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T11:01:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-07.xml b/glsa-200408-07.xml
index e53ced25..3d17987d 100644
--- a/glsa-200408-07.xml
+++ b/glsa-200408-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-07">
<title>Horde-IMP: Input validation vulnerability for Internet Explorer users</title>
<synopsis>
@@ -8,8 +7,8 @@
only affects users of Internet Explorer.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>August 10, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59336</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/horde-imp-3.2.5&quot;
- # emerge &quot;&gt;=www-apps/horde-imp-3.2.5&quot;</code>
+ # emerge -pv "&gt;=www-apps/horde-imp-3.2.5"
+ # emerge "&gt;=www-apps/horde-imp-3.2.5"</code>
</resolution>
<references>
- <uri link="http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h">Horde-IMP Changelog</uri>
- <uri link="http://secunia.com/advisories/12202/">Secunia Advisory SA12202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1443">CVE-2004-1443</uri>
+ <uri link="https://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h">Horde-IMP Changelog</uri>
+ <uri link="https://secunia.com/advisories/12202/">Secunia Advisory SA12202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1443">CVE-2004-1443</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 18:55:04 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T18:55:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-08.xml b/glsa-200408-08.xml
index 013868c6..bbb53f2a 100644
--- a/glsa-200408-08.xml
+++ b/glsa-200408-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-08">
<title>Cfengine: RSA Authentication Heap Corruption</title>
<synopsis>
@@ -8,8 +7,8 @@
AllowConnectionsFrom.
</synopsis>
<product type="ebuild">Cfengine</product>
- <announced>August 10, 2004</announced>
- <revised>May 22, 2006: 05</revised>
+ <announced>2004-08-10</announced>
+ <revised>2006-05-22: 05</revised>
<bug>59895</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/cfengine-2.1.8&quot;
- # emerge &quot;&gt;=net-misc/cfengine-2.1.8&quot;</code>
+ # emerge -pv "&gt;=net-misc/cfengine-2.1.8"
+ # emerge "&gt;=net-misc/cfengine-2.1.8"</code>
</resolution>
<references>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10">Corelabs Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1701">CVE-2004-1701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1702">CVE-2004-1702</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10">Corelabs Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1701">CVE-2004-1701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1702">CVE-2004-1702</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 9 Aug 2004 21:29:04 +0000">
+ <metadata tag="submitter" timestamp="2004-08-09T21:29:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-09.xml b/glsa-200408-09.xml
index 8fc9bdb9..a4db0e93 100644
--- a/glsa-200408-09.xml
+++ b/glsa-200408-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-09">
<title>Roundup: Filesystem access vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to a remote attacker.
</synopsis>
<product type="ebuild">Roundup</product>
- <announced>August 11, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-11</announced>
+ <revised>2006-05-22: 03</revised>
<bug>53494</bug>
<access>remote</access>
<affected>
@@ -49,14 +48,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/roundup-0.7.6&quot;
- # emerge &quot;&gt;=www-apps/roundup-0.7.6&quot;</code>
+ # emerge -pv "&gt;=www-apps/roundup-0.7.6"
+ # emerge "&gt;=www-apps/roundup-0.7.6"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/11801/">Secunia Advisory SA11801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1444">CVE-2004-1444</uri>
+ <uri link="https://secunia.com/advisories/11801/">Secunia Advisory SA11801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1444">CVE-2004-1444</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 9 Aug 2004 18:49:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-09T18:49:24Z">
chriswhite
</metadata>
</glsa>
diff --git a/glsa-200408-10.xml b/glsa-200408-10.xml
index ec85a580..970b474e 100644
--- a/glsa-200408-10.xml
+++ b/glsa-200408-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-10">
<title>gv: Exploitable Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">gv</product>
- <announced>August 12, 2004</announced>
- <revised>August 12, 2004: 01</revised>
+ <announced>2004-08-12</announced>
+ <revised>2004-08-12: 01</revised>
<bug>59385</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/gv-3.5.8-r4"
- # emerge ">=app-text/gv-3.5.8-r4"</code>
+ # emerge -pv "&gt;=app-text/gv-3.5.8-r4"
+ # emerge "&gt;=app-text/gv-3.5.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0838">CAN-2002-0838</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0838">CAN-2002-0838</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 09:15:36 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T09:15:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 20:43:19 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T20:43:19Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-11.xml b/glsa-200408-11.xml
index f7abf96f..c55debc8 100644
--- a/glsa-200408-11.xml
+++ b/glsa-200408-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-11">
<title>Nessus: "adduser" race condition vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation attack.
</synopsis>
<product type="ebuild">Nessus</product>
- <announced>August 12, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-12</announced>
+ <revised>2006-05-22: 02</revised>
<bug>58014</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/nessus-2.0.12&quot;
- # emerge &quot;&gt;=net-analyzer/nessus-2.0.12&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/nessus-2.0.12"
+ # emerge "&gt;=net-analyzer/nessus-2.0.12"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12127/">Secunia Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1445">CVE-2004-1445</uri>
+ <uri link="https://secunia.com/advisories/12127/">Secunia Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1445">CVE-2004-1445</uri>
</references>
<metadata tag="requester">
koon
diff --git a/glsa-200408-12.xml b/glsa-200408-12.xml
index 7c4a9395..0477527b 100644
--- a/glsa-200408-12.xml
+++ b/glsa-200408-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-12">
<title>Gaim: MSN protocol parsing function buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>August 12, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-12</announced>
+ <revised>2006-05-22: 03</revised>
<bug>60034</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/gaim-0.81-r1&quot;
- # emerge &quot;&gt;=net-im/gaim-0.81-r1&quot;</code>
+ # emerge -pv "&gt;=net-im/gaim-0.81-r1"
+ # emerge "&gt;=net-im/gaim-0.81-r1"</code>
</resolution>
<references>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8382">OSVDB ID: 8382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 12 Aug 2004 16:07:01 +0000">
+ <metadata tag="submitter" timestamp="2004-08-12T16:07:01Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-13.xml b/glsa-200408-13.xml
index 3b6788df..76903711 100644
--- a/glsa-200408-13.xml
+++ b/glsa-200408-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-13">
<title>kdebase, kdelibs: Multiple security issues</title>
<synopsis>
@@ -9,8 +8,8 @@
injection.
</synopsis>
<product type="ebuild">kde, kdebase, kdelibs</product>
- <announced>August 12, 2004</announced>
- <revised>August 12, 2004: 01</revised>
+ <announced>2004-08-12</announced>
+ <revised>2004-08-12: 01</revised>
<bug>60068</bug>
<access>remote and local</access>
<affected>
@@ -62,18 +61,18 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdebase-3.2.3-r1"
- # emerge ">=kde-base/kdebase-3.2.3-r1"
+ # emerge -pv "&gt;=kde-base/kdebase-3.2.3-r1"
+ # emerge "&gt;=kde-base/kdebase-3.2.3-r1"
- # emerge -pv ">=kde-base/kdelibs-3.2.3-r1"
- # emerge ">=kde-base/kdelibs-3.2.3-r1"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.3-r1"
+ # emerge "&gt;=kde-base/kdelibs-3.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20040811-1.txt">KDE Advisory: Temporary Directory Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20040811-2.txt">KDE Advisory: DCOPServer Temporary Filename Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20040811-3.txt">KDE Advisory: Konqueror Frame Injection Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-1.txt">KDE Advisory: Temporary Directory Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-2.txt">KDE Advisory: DCOPServer Temporary Filename Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-3.txt">KDE Advisory: Konqueror Frame Injection Vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Aug 2004 17:47:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-11T17:47:27Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-14.xml b/glsa-200408-14.xml
index 2512942a..3aeeb608 100644
--- a/glsa-200408-14.xml
+++ b/glsa-200408-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-14">
<title>acroread: UUDecode filename buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to execution of arbitrary code or programs.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 15, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-15</announced>
+ <revised>2006-05-22: 03</revised>
<bug>60205</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/acroread-5.09&quot;
- # emerge &quot;&gt;=app-text/acroread-5.09&quot;</code>
+ # emerge -pv "&gt;=app-text/acroread-5.09"
+ # emerge "&gt;=app-text/acroread-5.09"</code>
</resolution>
<references>
<uri link="http://idefense.com/application/poi/display?id=124&amp;type=vulnerabilities">iDEFENSE Advisory 124</uri>
<uri link="http://idefense.com/application/poi/display?id=125&amp;type=vulnerabilities">iDEFENSE Advisory 125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630">CVE-2004-0630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0631">CVE-2004-0631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630">CVE-2004-0630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0631">CVE-2004-0631</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 07:56:36 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T07:56:36Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-15.xml b/glsa-200408-15.xml
index ff125490..1e7c845a 100644
--- a/glsa-200408-15.xml
+++ b/glsa-200408-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-15">
<title>Tomcat: Insecure installation</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts as root.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>August 15, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-08-15</announced>
+ <revised>2006-05-22: 04</revised>
<bug>59232</bug>
<access>local</access>
<affected>
@@ -57,13 +56,13 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/tomcat-5.0.27-r3&quot;
- # emerge &quot;&gt;=www-servers/tomcat-5.0.27-r3&quot;</code>
+ # emerge -pv "&gt;=www-servers/tomcat-5.0.27-r3"
+ # emerge "&gt;=www-servers/tomcat-5.0.27-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1452">CVE-2004-1452</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1452">CVE-2004-1452</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 20:54:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T20:54:24Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200408-16.xml b/glsa-200408-16.xml
index 04680d3a..01bccfdc 100644
--- a/glsa-200408-16.xml
+++ b/glsa-200408-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-16">
<title>glibc: Information leak with LD_DEBUG</title>
<synopsis>
@@ -8,8 +7,8 @@
SUID binaries.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>August 16, 2004</announced>
- <revised>May 28, 2006: 04</revised>
+ <announced>2004-08-16</announced>
+ <revised>2006-05-28: 04</revised>
<bug>59526</bug>
<access>local</access>
<affected>
@@ -73,9 +72,9 @@
# emerge your_version</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453">CVE-2004-1453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453">CVE-2004-1453</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 17:16:41 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T17:16:41Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-17.xml b/glsa-200408-17.xml
index 15c7c76c..69e025bf 100644
--- a/glsa-200408-17.xml
+++ b/glsa-200408-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-17">
<title>rsync: Potential information leakage</title>
<synopsis>
@@ -9,8 +8,8 @@
on rsync server configurations that allow uploading.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>August 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60309</bug>
<access>remote</access>
<affected>
@@ -57,15 +56,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/rsync-2.6.0-r3&quot;
- # emerge &quot;&gt;=net-misc/rsync-2.6.0-r3&quot;</code>
+ # emerge -pv "&gt;=net-misc/rsync-2.6.0-r3"
+ # emerge "&gt;=net-misc/rsync-2.6.0-r3"</code>
</resolution>
<references>
- <uri link="http://samba.org/rsync/#security_aug04">rsync Advisory</uri>
- <uri link="http://lists.samba.org/archive/rsync-announce/2004/000017.html">rsync 2.6.2 announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0792">CVE-2004-0792</uri>
+ <uri link="https://samba.org/rsync/#security_aug04">rsync Advisory</uri>
+ <uri link="https://lists.samba.org/archive/rsync-announce/2004/000017.html">rsync 2.6.2 announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0792">CVE-2004-0792</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 19:22:18 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T19:22:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-18.xml b/glsa-200408-18.xml
index 38363b4d..10d0dba6 100644
--- a/glsa-200408-18.xml
+++ b/glsa-200408-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-18">
<title>xine-lib: VCD MRL buffer overflow</title>
<synopsis>
xine-lib contains an exploitable buffer overflow in the VCD handling code
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>August 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59948</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc5-r3&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc5-r3&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc5-r3"
+ # emerge "&gt;=media-libs/xine-lib-1_rc5-r3"</code>
</resolution>
<references>
<uri link="http://www.open-security.org/advisories/6">Open Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 05:07:02 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T05:07:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-19.xml b/glsa-200408-19.xml
index 2df5a7d2..6f29d10a 100644
--- a/glsa-200408-19.xml
+++ b/glsa-200408-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-19">
<title>courier-imap: Remote Format String Vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
execute arbitrary code as the user running courier-imapd (oftentimes root).
</synopsis>
<product type="ebuild">courier-imap</product>
- <announced>August 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60865</bug>
<access>remote</access>
<affected>
@@ -58,14 +57,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-mail/courier-imap-3.0.5&quot;
- # emerge &quot;&gt;=net-mail/courier-imap-3.0.5&quot;</code>
+ # emerge -pv "&gt;=net-mail/courier-imap-3.0.5"
+ # emerge "&gt;=net-mail/courier-imap-3.0.5"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=131&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0777">CVE-2004-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0777">CVE-2004-0777</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 18:47:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T18:47:27Z">
condordes
</metadata>
</glsa>
diff --git a/glsa-200408-20.xml b/glsa-200408-20.xml
index bbe3c4a7..4177dc70 100644
--- a/glsa-200408-20.xml
+++ b/glsa-200408-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-20">
<title>Qt: Image loader overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
crashes or arbitrary code execution.
</synopsis>
<product type="ebuild">Qt</product>
- <announced>August 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60855</bug>
<access>local</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-libs/qt-3.3.3&quot;
- # emerge &quot;&gt;=x11-libs/qt-3.3.3&quot;</code>
+ # emerge -pv "&gt;=x11-libs/qt-3.3.3"
+ # emerge "&gt;=x11-libs/qt-3.3.3"</code>
</resolution>
<references>
<uri link="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:085">Mandrake Advisory</uri>
<uri link="http://www.trolltech.com/developer/changes/changes-3.3.3.html">Qt 3.3.3 ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691">CVE-2004-0691</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692">CVE-2004-0692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693">CVE-2004-0693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691">CVE-2004-0691</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692">CVE-2004-0692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693">CVE-2004-0693</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Aug 2004 22:45:25 +0000">
+ <metadata tag="requester" timestamp="2004-08-20T22:45:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 21 Aug 2004 19:29:43 +0000">
+ <metadata tag="submitter" timestamp="2004-08-21T19:29:43Z">
condordes
</metadata>
</glsa>
diff --git a/glsa-200408-21.xml b/glsa-200408-21.xml
index 6dc2f997..5219a731 100644
--- a/glsa-200408-21.xml
+++ b/glsa-200408-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-21">
<title>Cacti: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a SQL injection attack.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>August 23, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-08-23</announced>
+ <revised>2006-05-22: 04</revised>
<bug>60630</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/cacti-0.8.5a-r1&quot;
- # emerge &quot;&gt;=net-analyzer/cacti-0.8.5a-r1&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/cacti-0.8.5a-r1"
+ # emerge "&gt;=net-analyzer/cacti-0.8.5a-r1"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0717.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1737">CVE-2004-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1737">CVE-2004-1737</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Aug 2004 05:36:15 +0000">
+ <metadata tag="requester" timestamp="2004-08-19T05:36:15Z">
dmargoli
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 08:02:41 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T08:02:41Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-22.xml b/glsa-200408-22.xml
index 9f878115..70c81e3e 100644
--- a/glsa-200408-22.xml
+++ b/glsa-200408-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-22">
<title>Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
overflows.
</synopsis>
<product type="ebuild">www-client/mozilla, www-client/mozilla-firefox, mail-client/mozilla-thunderbird, www-client/galeon, www-client/epiphany</product>
- <announced>August 23, 2004</announced>
- <revised>December 30, 2007: 06</revised>
+ <announced>2004-08-23</announced>
+ <revised>2007-12-30: 06</revised>
<bug>57380</bug>
<bug>59419</bug>
<access>remote</access>
@@ -102,16 +101,16 @@
# emerge your-version</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763">CAN-2004-0763</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758">CAN-2004-0758</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763">CAN-2004-0763</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758">CAN-2004-0758</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 18:21:36 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T18:21:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 19:57:21 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T19:57:21Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200408-23.xml b/glsa-200408-23.xml
index a1c27bdd..bdd7a0ad 100644
--- a/glsa-200408-23.xml
+++ b/glsa-200408-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-23">
<title>kdelibs: Cross-domain cookie injection vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
web server.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>August 24, 2004</announced>
- <revised>August 24, 2004: 01</revised>
+ <announced>2004-08-24</announced>
+ <revised>2004-08-24: 01</revised>
<bug>61389</bug>
<access>remote</access>
<affected>
@@ -46,8 +45,8 @@
be used instead of the cookie issued by the legitimate site. Depending on
the design of the legitimate site, this may allow an attacker to gain
access to the user's session. For further explanation on this type of
- attack, see the paper titled &quot;Session Fixation Vulnerability in
- Web-based Applications&quot; (reference 2).
+ attack, see the paper titled "Session Fixation Vulnerability in
+ Web-based Applications" (reference 2).
</p>
</impact>
<workaround>
@@ -63,17 +62,17 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdelibs-3.2.3-r2"
- # emerge ">=kde-base/kdelibs-3.2.3-r2"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.3-r2"
+ # emerge "&gt;=kde-base/kdelibs-3.2.3-r2"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20040823-1.txt">KDE Advisory</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040823-1.txt">KDE Advisory</uri>
<uri link="http://www.acros.si/papers/session_fixation.pdf">Session Fixation Vulnerability in Web-based Applications</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Aug 2004 20:45:47 +0000">
+ <metadata tag="requester" timestamp="2004-08-23T20:45:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Aug 2004 19:26:35 +0000">
+ <metadata tag="submitter" timestamp="2004-08-24T19:26:35Z">
condordes
</metadata>
</glsa>
diff --git a/glsa-200408-24.xml b/glsa-200408-24.xml
index d2fe4e66..96195d81 100644
--- a/glsa-200408-24.xml
+++ b/glsa-200408-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-24">
<title>Linux Kernel: Multiple information leaks</title>
<synopsis>
@@ -9,8 +8,8 @@
exploitation of the system.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>August 25, 2004</announced>
- <revised>March 27, 2011: 03</revised>
+ <announced>2004-08-25</announced>
+ <revised>2011-03-27: 03</revised>
<bug>59378</bug>
<bug>59769</bug>
<bug>59905</bug>
@@ -223,11 +222,11 @@
# # If you use genkernel, run genkernel as you would normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415">CAN-2004-0415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0685">CAN-2004-0685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1058">CVE-2004-1058</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415">CAN-2004-0415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0685">CAN-2004-0685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1058">CVE-2004-1058</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 17 Aug 2004 02:16:55 +0000">
+ <metadata tag="submitter" timestamp="2004-08-17T02:16:55Z">
plasmaroo
</metadata>
</glsa>
diff --git a/glsa-200408-25.xml b/glsa-200408-25.xml
index 06fdbc9c..7ae2be98 100644
--- a/glsa-200408-25.xml
+++ b/glsa-200408-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-25">
<title>MoinMoin: Group ACL bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
authorized users.
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>August 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57913</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/moinmoin-1.2.3&quot;
- # emerge &quot;&gt;=www-apps/moinmoin-1.2.3&quot;</code>
+ # emerge -pv "&gt;=www-apps/moinmoin-1.2.3"
+ # emerge "&gt;=www-apps/moinmoin-1.2.3"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801">MoinMoin Announcement</uri>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8194">OSVDB Advisory 8194</uri>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8195">OSVDB Advisory 8195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1462">CVE-2004-1462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1463">CVE-2004-1463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1462">CVE-2004-1462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1463">CVE-2004-1463</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 05:10:31 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T05:10:31Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200408-26.xml b/glsa-200408-26.xml
index c95a139d..f4111fb9 100644
--- a/glsa-200408-26.xml
+++ b/glsa-200408-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-26">
<title>zlib: Denial of service vulnerability</title>
<synopsis>
The zlib library contains a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>August 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61749</bug>
<access>remote</access>
<affected>
@@ -47,8 +46,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=sys-libs/zlib-1.2.1-r3&quot;
- # emerge &quot;&gt;=sys-libs/zlib-1.2.1-r3&quot;</code>
+ # emerge -pv "&gt;=sys-libs/zlib-1.2.1-r3"
+ # emerge "&gt;=sys-libs/zlib-1.2.1-r3"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend
on older versions of zlib :
@@ -58,12 +57,12 @@
</resolution>
<references>
<uri link="http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html">OpenPKG-SA-2004.038-zlib</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797">CVE-2004-0797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797">CVE-2004-0797</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Aug 2004 19:08:52 +0000">
+ <metadata tag="requester" timestamp="2004-08-26T19:08:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Aug 2004 05:21:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-27T05:21:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200408-27.xml b/glsa-200408-27.xml
index 6d8bdc8f..a79c46db 100644
--- a/glsa-200408-27.xml
+++ b/glsa-200408-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-27">
<title>Gaim: New vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code or commands.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>August 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61457</bug>
<access>remote</access>
<affected>
@@ -62,20 +61,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/gaim-0.81-r5&quot;
- # emerge &quot;&gt;=net-im/gaim-0.81-r5&quot;</code>
+ # emerge -pv "&gt;=net-im/gaim-0.81-r5"
+ # emerge "&gt;=net-im/gaim-0.81-r5"</code>
</resolution>
<references>
- <uri link="http://gaim.sourceforge.net/security/index.php">Gaim security issues</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0754">CVE-2004-0754</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0784">CVE-2004-0784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785">CVE-2004-0785</uri>
+ <uri link="https://gaim.sourceforge.net/security/index.php">Gaim security issues</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0754">CVE-2004-0754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0784">CVE-2004-0784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785">CVE-2004-0785</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Aug 2004 15:30:26 +0000">
+ <metadata tag="requester" timestamp="2004-08-26T15:30:26Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Aug 2004 19:01:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-26T19:01:27Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-01.xml b/glsa-200409-01.xml
index 159ac1f8..fc933d98 100644
--- a/glsa-200409-01.xml
+++ b/glsa-200409-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-01">
<title>vpopmail: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
code.
</synopsis>
<product type="ebuild">vpopmail</product>
- <announced>September 01, 2004</announced>
- <revised>September 01, 2004: 01</revised>
+ <announced>2004-09-01</announced>
+ <revised>2004-09-01: 01</revised>
<bug>60844</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/vpopmail-5.4.6"
- # emerge ">=net-mail/vpopmail-5.4.6"</code>
+ # emerge -pv "&gt;=net-mail/vpopmail-5.4.6"
+ # emerge "&gt;=net-mail/vpopmail-5.4.6"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=400873">vpopmail Announcement</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=400873">vpopmail Announcement</uri>
<uri link="http://www.securityfocus.com/archive/1/371913/2004-08-15/2004-08-21/0">Bugtraq Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 Aug 2004 17:42:34 +0000">
+ <metadata tag="submitter" timestamp="2004-08-26T17:42:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-02.xml b/glsa-200409-02.xml
index a042b03b..fd3612b6 100644
--- a/glsa-200409-02.xml
+++ b/glsa-200409-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-02">
<title>MySQL: Insecure temporary file creation in mysqlhotcopy</title>
<synopsis>
@@ -9,8 +8,8 @@
important data.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>September 01, 2004</announced>
- <revised>September 01, 2004: 01</revised>
+ <announced>2004-09-01</announced>
+ <revised>2004-09-01: 01</revised>
<bug>60744</bug>
<access>local</access>
<affected>
@@ -55,16 +54,16 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.20-r1"
- # emerge ">=dev-db/mysql-4.0.20-r1"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.20-r1"
+ # emerge "&gt;=dev-db/mysql-4.0.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457">CAN-2004-0457</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457">CAN-2004-0457</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 31 Aug 2004 08:03:33 +0000">
+ <metadata tag="requester" timestamp="2004-08-31T08:03:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Aug 2004 15:42:33 +0000">
+ <metadata tag="submitter" timestamp="2004-08-31T15:42:33Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-03.xml b/glsa-200409-03.xml
index f9ca7d2f..d8b934d9 100644
--- a/glsa-200409-03.xml
+++ b/glsa-200409-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-03">
<title>Python 2.2: Buffer overflow in getaddrinfo()</title>
<synopsis>
@@ -8,8 +7,8 @@
malformed IPV6 address is encountered by getaddrinfo().
</synopsis>
<product type="ebuild">Python</product>
- <announced>September 02, 2004</announced>
- <revised>September 02, 2004: 01</revised>
+ <announced>2004-09-02</announced>
+ <revised>2004-09-02: 01</revised>
<bug>62440</bug>
<access>remote</access>
<affected>
@@ -48,14 +47,14 @@
<code>
# emerge sync
- # emerge -pv ">=dev-lang/python-2.2.2"
- # emerge ">=dev-lang/python-2.2.2"</code>
+ # emerge -pv "&gt;=dev-lang/python-2.2.2"
+ # emerge "&gt;=dev-lang/python-2.2.2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150">CVE-2004-0150</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150">CVE-2004-0150</uri>
<uri link="http://www.osvdb.org/4172">OSVDB:4172</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 31 Aug 2004 22:51:44 +0000">
+ <metadata tag="submitter" timestamp="2004-08-31T22:51:44Z">
chriswhite
</metadata>
</glsa>
diff --git a/glsa-200409-04.xml b/glsa-200409-04.xml
index 941ee110..c0127d9a 100644
--- a/glsa-200409-04.xml
+++ b/glsa-200409-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-04">
<title>Squid: Denial of service when using NTLM authentication</title>
<synopsis>
@@ -8,8 +7,8 @@
NTLM helpers.
</synopsis>
<product type="ebuild">squid</product>
- <announced>September 02, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-09-02</announced>
+ <revised>2007-12-30: 03</revised>
<bug>61280</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-www/squid-2.5.6-r2&quot;
- # emerge &quot;&gt;=net-www/squid-2.5.6-r2&quot;</code>
+ # emerge -pv "&gt;=net-www/squid-2.5.6-r2"
+ # emerge "&gt;=net-www/squid-2.5.6-r2"</code>
</resolution>
<references>
<uri link="http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string">Squid-2.5 Patches</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0832">CVE-2004-0832</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0832">CVE-2004-0832</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 10:25:32 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T10:25:32Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200409-05.xml b/glsa-200409-05.xml
index 08546dc6..8cbdaacb 100644
--- a/glsa-200409-05.xml
+++ b/glsa-200409-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-05">
<title>Gallery: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability which could lead to execution of arbitrary commands.
</synopsis>
<product type="ebuild">Gallery</product>
- <announced>September 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60742</bug>
<access>remote</access>
<affected>
@@ -60,18 +59,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/gallery-1.4.4_p2&quot;
- # emerge &quot;&gt;=www-apps/gallery-1.4.4_p2&quot;</code>
+ # emerge -pv "&gt;=www-apps/gallery-1.4.4_p2"
+ # emerge "&gt;=www-apps/gallery-1.4.4_p2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html">Full Disclosure Announcement</uri>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=134&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1466">CVE-2004-1466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1466">CVE-2004-1466</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Aug 2004 09:02:45 +0000">
+ <metadata tag="requester" timestamp="2004-08-22T09:02:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Aug 2004 23:33:36 +0000">
+ <metadata tag="submitter" timestamp="2004-08-25T23:33:36Z">
chriswhite
</metadata>
</glsa>
diff --git a/glsa-200409-06.xml b/glsa-200409-06.xml
index da894af3..1d84f3c7 100644
--- a/glsa-200409-06.xml
+++ b/glsa-200409-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-06">
<title>eGroupWare: Multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">eGroupWare</product>
- <announced>September 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61510</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/egroupware-1.0.00.004&quot;
- # emerge &quot;&gt;=www-apps/egroupware-1.0.00.004&quot;</code>
+ # emerge -pv "&gt;=www-apps/egroupware-1.0.00.004"
+ # emerge "&gt;=www-apps/egroupware-1.0.00.004"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/forum/forum.php?forum_id=401807">eGroupWare Announcement</uri>
<uri link="http://www.securityfocus.com/archive/1/372603/2004-08-21/2004-08-27/0">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1467">CVE-2004-1467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1467">CVE-2004-1467</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 1 Sep 2004 13:44:57 +0000">
+ <metadata tag="requester" timestamp="2004-09-01T13:44:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 1 Sep 2004 19:01:03 +0000">
+ <metadata tag="submitter" timestamp="2004-09-01T19:01:03Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-07.xml b/glsa-200409-07.xml
index e2c9d3bb..7a6825f9 100644
--- a/glsa-200409-07.xml
+++ b/glsa-200409-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-07">
<title>xv: Buffer overflows in image handling</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>September 03, 2004</announced>
- <revised>September 03, 2004: 01</revised>
+ <announced>2004-09-03</announced>
+ <revised>2004-09-03: 01</revised>
<bug>61619</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/xv-3.10a-r7"
- # emerge ">=media-gfx/xv-3.10a-r7"</code>
+ # emerge -pv "&gt;=media-gfx/xv-3.10a-r7"
+ # emerge "&gt;=media-gfx/xv-3.10a-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/372345/2004-08-15/2004-08-21/0">BugTraq Advisory</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 2 Sep 2004 20:38:02 +0000">
+ <metadata tag="requester" timestamp="2004-09-02T20:38:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 23:57:51 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T23:57:51Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-08.xml b/glsa-200409-08.xml
index c9e55a88..2d25653d 100644
--- a/glsa-200409-08.xml
+++ b/glsa-200409-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-08">
<title>Ruby: CGI::Session creates files insecurely</title>
<synopsis>
@@ -9,8 +8,8 @@
be able to read sensitive data stored in session files.
</synopsis>
<product type="ebuild">dev-lang/ruby</product>
- <announced>September 03, 2004</announced>
- <revised>September 03, 2004: 01</revised>
+ <announced>2004-09-03</announced>
+ <revised>2004-09-03: 01</revised>
<bug>60525</bug>
<access>local</access>
<affected>
@@ -57,16 +56,16 @@
<code>
# emerge sync
- # emerge -pv ">=dev-lang/ruby-your_version"
- # emerge ">=dev-lang/ruby-your_version"</code>
+ # emerge -pv "&gt;=dev-lang/ruby-your_version"
+ # emerge "&gt;=dev-lang/ruby-your_version"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755">CAN-2004-0755</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755">CAN-2004-0755</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Aug 2004 23:01:05 +0000">
+ <metadata tag="requester" timestamp="2004-08-28T23:01:05Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 1 Sep 2004 04:27:07 +0000">
+ <metadata tag="submitter" timestamp="2004-09-01T04:27:07Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200409-09.xml b/glsa-200409-09.xml
index f4064d36..f6a42c1d 100644
--- a/glsa-200409-09.xml
+++ b/glsa-200409-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-09">
<title>MIT krb5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerability.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>September 06, 2004</announced>
- <revised>September 06, 2004: 01</revised>
+ <announced>2004-09-06</announced>
+ <revised>2004-09-06: 01</revised>
<bug>62417</bug>
<access>remote</access>
<affected>
@@ -63,21 +62,21 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/mit-krb5-1.3.4"
- # emerge ">=app-crypt/mit-krb5-1.3.4"</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.4"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.4"</code>
</resolution>
<references>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt">MIT krb5 Security Advisory 2004-002</uri>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt">MIT krb5 Security Advisory 2004-003</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0642">CAN-2004-0642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0643">CAN-2004-0643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0644">CAN-2004-0644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0772">CAN-2004-0772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0642">CAN-2004-0642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0643">CAN-2004-0643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0644">CAN-2004-0644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0772">CAN-2004-0772</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:07:22 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:07:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 16:18:26 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T16:18:26Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200409-10.xml b/glsa-200409-10.xml
index 7a7534b0..8aa164ed 100644
--- a/glsa-200409-10.xml
+++ b/glsa-200409-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-10">
<title>multi-gnome-terminal: Information leak</title>
<synopsis>
@@ -9,8 +8,8 @@
the system to read sensitive data, including passwords.
</synopsis>
<product type="ebuild">multi-gnome-terminal</product>
- <announced>September 06, 2004</announced>
- <revised>September 06, 2004: 01</revised>
+ <announced>2004-09-06</announced>
+ <revised>2004-09-06: 01</revised>
<bug>62322</bug>
<access>local</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv ">=x11-terms/multi-gnome-terminal-1.6.2-r1"
- # emerge ">=x11-terms/multi-gnome-terminal-1.6.2-r1"</code>
+ # emerge -pv "&gt;=x11-terms/multi-gnome-terminal-1.6.2-r1"
+ # emerge "&gt;=x11-terms/multi-gnome-terminal-1.6.2-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Sun, 5 Sep 2004 20:51:40 +0000">
+ <metadata tag="requester" timestamp="2004-09-05T20:51:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Sep 2004 00:32:18 +0000">
+ <metadata tag="submitter" timestamp="2004-09-06T00:32:18Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Sep 2004 17:31:16 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-06T17:31:16Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-11.xml b/glsa-200409-11.xml
index 3df74b31..49ed2dfd 100644
--- a/glsa-200409-11.xml
+++ b/glsa-200409-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-11">
<title>star: Suid root vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthorized root access to an attacker.
</synopsis>
<product type="ebuild">star</product>
- <announced>September 07, 2004</announced>
- <revised>May 30, 2006: 03</revised>
+ <announced>2004-09-07</announced>
+ <revised>2006-05-30: 03</revised>
<bug>61797</bug>
<access>local</access>
<affected>
@@ -48,20 +47,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/star-1.5_alpha46&quot;
- # emerge &quot;&gt;=app-arch/star-1.5_alpha46&quot;</code>
+ # emerge -pv "&gt;=app-arch/star-1.5_alpha46"
+ # emerge "&gt;=app-arch/star-1.5_alpha46"</code>
</resolution>
<references>
<uri link="https://lists.berlios.de/pipermail/star-users/2004-August/000239.html">Star Mailing List Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0850">CVE-2004-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0850">CVE-2004-0850</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:05:50 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:05:50Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 19:37:00 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T19:37:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 7 Sep 2004 20:59:47 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-07T20:59:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-12.xml b/glsa-200409-12.xml
index db4c1889..79a8fdf8 100644
--- a/glsa-200409-12.xml
+++ b/glsa-200409-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-12">
<title>ImageMagick, imlib, imlib2: BMP decoding buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities in the BMP image processing code.
</synopsis>
<product type="ebuild">imagemagick imlib</product>
- <announced>September 08, 2004</announced>
- <revised>September 08, 2004: 01</revised>
+ <announced>2004-09-08</announced>
+ <revised>2004-09-08: 01</revised>
<bug>62309</bug>
<bug>62487</bug>
<access>remote</access>
@@ -60,39 +59,39 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
- # emerge ">=media-gfx/imagemagick-6.0.7.1"</code>
+ # emerge -pv "&gt;=media-gfx/imagemagick-6.0.7.1"
+ # emerge "&gt;=media-gfx/imagemagick-6.0.7.1"</code>
<p>
All imlib users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/imlib-1.9.14-r2"
- # emerge ">=media-libs/imlib-1.9.14-r2"</code>
+ # emerge -pv "&gt;=media-libs/imlib-1.9.14-r2"
+ # emerge "&gt;=media-libs/imlib-1.9.14-r2"</code>
<p>
All imlib2 users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/imlib2-1.1.2"
- # emerge ">=media-libs/imlib2-1.1.2"</code>
+ # emerge -pv "&gt;=media-libs/imlib2-1.1.2"
+ # emerge "&gt;=media-libs/imlib2-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817">CAN-2004-0817</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
- <uri link="http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html">ImageMagick Mailing List</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817">CAN-2004-0817</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
+ <uri link="https://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html">ImageMagick Mailing List</uri>
<uri link="http://securitytracker.com/alerts/2004/Aug/1011104.html">SecurityTracker #1011104</uri>
<uri link="http://securitytracker.com/alerts/2004/Aug/1011105.html">SecurityTracker #1011105</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 6 Sep 2004 16:14:33 +0000">
+ <metadata tag="requester" timestamp="2004-09-06T16:14:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Sep 2004 23:42:01 +0000">
+ <metadata tag="submitter" timestamp="2004-09-06T23:42:01Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 8 Sep 2004 07:22:02 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-08T07:22:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-13.xml b/glsa-200409-13.xml
index a10f7a7b..fe9e59d8 100644
--- a/glsa-200409-13.xml
+++ b/glsa-200409-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-13">
<title>LHa: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">lha</product>
- <announced>September 08, 2004</announced>
- <revised>October 20, 2006: 02</revised>
+ <announced>2004-09-08</announced>
+ <revised>2006-10-20: 02</revised>
<bug>62618</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
<code>
# emerge sync
- # emerge -pv ">=app-arch/lha-114i-r4"
- # emerge ">=app-arch/lha-114i-r4"</code>
+ # emerge -pv "&gt;=app-arch/lha-114i-r4"
+ # emerge "&gt;=app-arch/lha-114i-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0694">CAN-2004-0694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0745">CAN-2004-0745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0769">CAN-2004-0769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0771">CAN-2004-0771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0694">CAN-2004-0694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0745">CAN-2004-0745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0769">CAN-2004-0769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0771">CAN-2004-0771</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 8 Sep 2004 13:12:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-08T13:12:24Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 8 Sep 2004 19:32:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-08T19:32:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-14.xml b/glsa-200409-14.xml
index 32d67232..06f270e6 100644
--- a/glsa-200409-14.xml
+++ b/glsa-200409-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-14">
<title>Samba: Remote printing non-vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
but it cannot be used to perform a remote denial of service attack.
</synopsis>
<product type="ebuild">samba</product>
- <announced>September 09, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-09-09</announced>
+ <revised>2006-05-22: 03</revised>
<bug>62476</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
</resolution>
<references>
- <uri link="http://samba.org/samba/history/samba-3.0.6.html">Samba Release Notes</uri>
+ <uri link="https://samba.org/samba/history/samba-3.0.6.html">Samba Release Notes</uri>
<uri link="https://bugzilla.samba.org/show_bug.cgi?id=1520">Samba Bug #1520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829">CVE-2004-0829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829">CVE-2004-0829</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:09:15 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:09:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 18:44:38 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T18:44:38Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 9 Sep 2004 04:56:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-09T04:56:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-15.xml b/glsa-200409-15.xml
index 295908ba..886333fa 100644
--- a/glsa-200409-15.xml
+++ b/glsa-200409-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-15">
<title>Webmin, Usermin: Multiple vulnerabilities in Usermin</title>
<synopsis>
@@ -10,8 +9,8 @@
execute a symlink attack at installation time.
</synopsis>
<product type="ebuild">Usermin</product>
- <announced>September 12, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-12</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63167</bug>
<access>remote</access>
<affected>
@@ -68,30 +67,30 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/usermin-1.090&quot;
- # emerge &quot;&gt;=app-admin/usermin-1.090&quot;</code>
+ # emerge -pv "&gt;=app-admin/usermin-1.090"
+ # emerge "&gt;=app-admin/usermin-1.090"</code>
<p>
All Webmin users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/webmin-1.160&quot;
- # emerge &quot;&gt;=app-admin/webmin-1.160&quot;</code>
+ # emerge -pv "&gt;=app-admin/webmin-1.160"
+ # emerge "&gt;=app-admin/webmin-1.160"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12488/">Secunia Advisory SA12488</uri>
+ <uri link="https://secunia.com/advisories/12488/">Secunia Advisory SA12488</uri>
<uri link="http://www.webmin.com/uchanges.html">Usermin Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0559">CVE-2004-0559</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1468">CVE-2004-1468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0559">CVE-2004-0559</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1468">CVE-2004-1468</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Sep 2004 12:32:20 +0000">
+ <metadata tag="requester" timestamp="2004-09-10T12:32:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Sep 2004 10:07:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-11T10:07:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Sep 2004 16:34:02 +0000">
+ <metadata tag="submitter" timestamp="2004-09-11T16:34:02Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200409-16.xml b/glsa-200409-16.xml
index 977e4266..420837d7 100644
--- a/glsa-200409-16.xml
+++ b/glsa-200409-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-16">
<title>Samba: Denial of Service vulnerabilities</title>
<synopsis>
Two Denial of Service vulnerabilities have been found and fixed in Samba.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>September 13, 2004</announced>
- <revised>September 13, 2004: 01</revised>
+ <announced>2004-09-13</announced>
+ <revised>2004-09-13: 01</revised>
<access>remote</access>
<affected>
<package name="net-fs/samba" auto="yes" arch="*">
@@ -54,17 +53,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.7"
- # emerge ">=net-fs/samba-3.0.7"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.7"
+ # emerge "&gt;=net-fs/samba-3.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807">CAN-2004-0807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808">CAN-2004-0808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807">CAN-2004-0807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808">CAN-2004-0808</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 11 Sep 2004 15:16:21 +0000">
+ <metadata tag="submitter" timestamp="2004-09-11T15:16:21Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Sep 2004 12:15:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-13T12:15:40Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-17.xml b/glsa-200409-17.xml
index 3157dc5d..ba472be7 100644
--- a/glsa-200409-17.xml
+++ b/glsa-200409-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-17">
<title>SUS: Local root vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">SUS</product>
- <announced>September 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63927</bug>
<access>local</access>
<affected>
@@ -50,21 +49,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/sus-2.0.2-r1&quot;
- # emerge &quot;&gt;=app-admin/sus-2.0.2-r1&quot;</code>
+ # emerge -pv "&gt;=app-admin/sus-2.0.2-r1"
+ # emerge "&gt;=app-admin/sus-2.0.2-r1"</code>
</resolution>
<references>
<uri link="http://pdg.uow.edu.au/sus/CHANGES">SUS ChangeLog</uri>
<uri link="http://www.securityfocus.com/archive/1/375109/2004-09-11/2004-09-17/0">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1469">CVE-2004-1469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1469">CVE-2004-1469</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Sep 2004 21:20:06 +0000">
+ <metadata tag="requester" timestamp="2004-09-13T21:20:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Sep 2004 00:10:33 +0000">
+ <metadata tag="submitter" timestamp="2004-09-14T00:10:33Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Sep 2004 10:08:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-14T10:08:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-18.xml b/glsa-200409-18.xml
index d3d4e7cb..99683ad3 100644
--- a/glsa-200409-18.xml
+++ b/glsa-200409-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-18">
<title>cdrtools: Local root vulnerability in cdrecord if set SUID root</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing users to escalate privileges.
</synopsis>
<product type="ebuild">cdrtools</product>
- <announced>September 14, 2004</announced>
- <revised>September 14, 2004: 01</revised>
+ <announced>2004-09-14</announced>
+ <revised>2004-09-14: 01</revised>
<bug>63187</bug>
<access>local</access>
<affected>
@@ -56,19 +55,19 @@
<code>
# emerge sync
- # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1"
- # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1"</code>
+ # emerge -pv "&gt;=app-cdr/cdrtools-2.01_alpha37-r1"
+ # emerge "&gt;=app-cdr/cdrtools-2.01_alpha37-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806">CAN-2004-0806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806">CAN-2004-0806</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Sep 2004 07:01:02 +0000">
+ <metadata tag="requester" timestamp="2004-09-14T07:01:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Sep 2004 15:13:17 +0000">
+ <metadata tag="submitter" timestamp="2004-09-14T15:13:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Sep 2004 20:25:30 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-14T20:25:30Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-19.xml b/glsa-200409-19.xml
index 2a877105..53ae7d97 100644
--- a/glsa-200409-19.xml
+++ b/glsa-200409-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-19">
<title>Heimdal: ftpd root escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to gain root privileges.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>September 16, 2004</announced>
- <revised>September 16, 2004: 01</revised>
+ <announced>2004-09-16</announced>
+ <revised>2004-09-16: 01</revised>
<bug>61412</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.3"
- # emerge ">=app-crypt/heimdal-0.6.3"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.3"
+ # emerge "&gt;=app-crypt/heimdal-0.6.3"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2004-09-13/">Heimdal advisory</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2004-09-13/">Heimdal advisory</uri>
<uri link="http://www.frasunek.com/lukemftpd.txt">Advisory by Przemyslaw Frasunek</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0794">CAN-2004-0794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0794">CAN-2004-0794</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 13 Sep 2004 14:06:46 +0000">
+ <metadata tag="submitter" timestamp="2004-09-13T14:06:46Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 04:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T04:33:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200409-20.xml b/glsa-200409-20.xml
index 18971432..16684aeb 100644
--- a/glsa-200409-20.xml
+++ b/glsa-200409-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-20">
<title>mpg123: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to arbitrary code execution.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>September 16, 2004</announced>
- <revised>September 16, 2004: 01</revised>
+ <announced>2004-09-16</announced>
+ <revised>2004-09-16: 01</revised>
<bug>63079</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
<code>
# emerge sync
- # emerge -pv ">=media-sound/mpg123-0.59s-r4"
- # emerge ">=media-sound/mpg123-0.59s-r4"</code>
+ # emerge -pv "&gt;=media-sound/mpg123-0.59s-r4"
+ # emerge "&gt;=media-sound/mpg123-0.59s-r4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/374433/2004-09-05/2004-09-11/0">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0805">CAN-2004-0805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0805">CAN-2004-0805</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Sep 2004 21:37:49 +0000">
+ <metadata tag="requester" timestamp="2004-09-14T21:37:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Sep 2004 15:59:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-15T15:59:24Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Sep 2004 18:43:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-15T18:43:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-21.xml b/glsa-200409-21.xml
index ddda1cd8..58fb0c8e 100644
--- a/glsa-200409-21.xml
+++ b/glsa-200409-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-21">
<title>Apache 2, mod_dav: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
local user to get escalated privileges.
</synopsis>
<product type="ebuild">apache</product>
- <announced>September 16, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-09-16</announced>
+ <revised>2007-12-30: 02</revised>
<bug>62626</bug>
<bug>63948</bug>
<bug>64145</bug>
@@ -69,31 +68,31 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.51"
- # emerge ">=www-servers/apache-2.0.51"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.51"
+ # emerge "&gt;=www-servers/apache-2.0.51"</code>
<p>
All mod_dav users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_dav-1.0.3-r2"
- # emerge ">=net-www/mod_dav-1.0.3-r2"</code>
+ # emerge -pv "&gt;=net-www/mod_dav-1.0.3-r2"
+ # emerge "&gt;=net-www/mod_dav-1.0.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">CAN-2004-0747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748">CAN-2004-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751">CAN-2004-0751</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">CAN-2004-0786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809">CAN-2004-0809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">CAN-2004-0747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748">CAN-2004-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751">CAN-2004-0751</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">CAN-2004-0786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809">CAN-2004-0809</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Sep 2004 04:54:03 +0000">
+ <metadata tag="requester" timestamp="2004-09-09T04:54:03Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Sep 2004 18:02:25 +0000">
+ <metadata tag="submitter" timestamp="2004-09-10T18:02:25Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 20:45:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T20:45:09Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-22.xml b/glsa-200409-22.xml
index fab7174b..5954d35e 100644
--- a/glsa-200409-22.xml
+++ b/glsa-200409-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-22">
<title>phpGroupWare: XSS vulnerability in wiki module</title>
<synopsis>
@@ -8,8 +7,8 @@
the wiki module.
</synopsis>
<product type="ebuild">phpGroupWare</product>
- <announced>September 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63063</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/phpgroupware-0.9.16.003&quot;
- # emerge &quot;&gt;=www-apps/phpgroupware-0.9.16.003&quot;</code>
+ # emerge -pv "&gt;=www-apps/phpgroupware-0.9.16.003"
+ # emerge "&gt;=www-apps/phpgroupware-0.9.16.003"</code>
</resolution>
<references>
<uri link="http://downloads.phpgroupware.org/changelog">phpGroupWare ChangeLog</uri>
- <uri link="http://secunia.com/advisories/12466/">Secunia Advisory SA12466</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0875">CVE-2004-0875</uri>
+ <uri link="https://secunia.com/advisories/12466/">Secunia Advisory SA12466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0875">CVE-2004-0875</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Sep 2004 12:36:45 +0000">
+ <metadata tag="requester" timestamp="2004-09-10T12:36:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Sep 2004 14:15:58 +0000">
+ <metadata tag="submitter" timestamp="2004-09-12T14:15:58Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 21:55:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T21:55:15Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-23.xml b/glsa-200409-23.xml
index c1e3122a..b9710d6e 100644
--- a/glsa-200409-23.xml
+++ b/glsa-200409-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-23">
<title>SnipSnap: HTTP response splitting</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning, cross-user defacement, and cross-site scripting.
</synopsis>
<product type="ebuild">snipsnap</product>
- <announced>September 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64154</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-java/snipsnap-bin-1.0_beta1&quot;
- # emerge &quot;&gt;=dev-java/snipsnap-bin-1.0beta1&quot;</code>
+ # emerge -pv "&gt;=dev-java/snipsnap-bin-1.0_beta1"
+ # emerge "&gt;=dev-java/snipsnap-bin-1.0beta1"</code>
</resolution>
<references>
<uri link="http://snipsnap.org/space/start/2004-09-14/1#SnipSnap_1.0b1_(uttoxeter)_released">SnipSnap Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1470">CVE-2004-1470</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1470">CVE-2004-1470</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Sep 2004 20:00:37 +0000">
+ <metadata tag="submitter" timestamp="2004-09-16T20:00:37Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 20:40:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T20:40:46Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-24.xml b/glsa-200409-24.xml
index 496d7e1f..c45834b2 100644
--- a/glsa-200409-24.xml
+++ b/glsa-200409-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-24">
<title>Foomatic: Arbitrary command execution in foomatic-rip filter</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow arbitrary command execution on the print server.
</synopsis>
<product type="ebuild">foomatic</product>
- <announced>September 20, 2004</announced>
- <revised>September 20, 2004: 01</revised>
+ <announced>2004-09-20</announced>
+ <revised>2004-09-20: 01</revised>
<bug>64166</bug>
<access>remote</access>
<affected>
@@ -40,7 +39,7 @@
<p>
This vulnerability may allow both local and remote attackers to execute
arbitrary commands on the print server with the permissions of the spooler
- (oftentimes the &quot;lp&quot; user).
+ (oftentimes the "lp" user).
</p>
</impact>
<workaround>
@@ -55,8 +54,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/foomatic-3.0.2"
- # emerge ">=net-print/foomatic-3.0.2"</code>
+ # emerge -pv "&gt;=net-print/foomatic-3.0.2"
+ # emerge "&gt;=net-print/foomatic-3.0.2"</code>
<p>
PLEASE NOTE: You should update foomatic, instead of foomatic-filters. This
will help to ensure that all other foomatic components remain functional.
@@ -65,12 +64,12 @@
<references>
<uri link="http://www.linuxprinting.org/pipermail/foomatic-devel/2004q3/001996.html">Foomatic Announcement</uri>
<uri link="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:094">Mandrakesoft Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801">CAN 2004-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801">CAN 2004-0801</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Sep 2004 17:39:12 +0000">
+ <metadata tag="submitter" timestamp="2004-09-16T17:39:12Z">
condordes
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 01:02:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T01:02:29Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-25.xml b/glsa-200409-25.xml
index aed97b95..6c97b08d 100644
--- a/glsa-200409-25.xml
+++ b/glsa-200409-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-25">
<title>CUPS: Denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
service when sending a carefully-crafted UDP packet to the IPP port.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>September 20, 2004</announced>
- <revised>September 21, 2004: 02</revised>
+ <announced>2004-09-20</announced>
+ <revised>2004-09-21: 02</revised>
<bug>64168</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/cups-1.1.20-r2"
- # emerge ">=net-print/cups-1.1.20-r2"</code>
+ # emerge -pv "&gt;=net-print/cups-1.1.20-r2"
+ # emerge "&gt;=net-print/cups-1.1.20-r2"</code>
</resolution>
<references>
- <uri link="http://www.cups.org/str.php?L863">CUPS Software Trouble Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558">CAN-2004-0558</uri>
+ <uri link="https://www.cups.org/str.php?L863">CUPS Software Trouble Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558">CAN-2004-0558</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Sep 2004 06:22:23 +0000">
+ <metadata tag="requester" timestamp="2004-09-19T06:22:23Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 00:58:55 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T00:58:55Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 00:59:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T00:59:53Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-26.xml b/glsa-200409-26.xml
index 4e5c84e4..c8c29e86 100644
--- a/glsa-200409-26.xml
+++ b/glsa-200409-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-26">
<title>Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>September 20, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-09-20</announced>
+ <revised>2007-12-30: 03</revised>
<bug>63996</bug>
<access>remote</access>
<affected>
@@ -99,21 +98,21 @@
# emerge your-version</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">Mozilla Security Advisory</uri>
- <uri link="http://www.us-cert.gov/cas/techalerts/TA04-261A.html">US-CERT Security Alert TA04-261A</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902">CVE-2004-0902</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0903">CVE-2004-0903</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904">CVE-2004-0904</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0905">CVE-2004-0905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906">CVE-2004-0906</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0907">CVE-2004-0907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908">CVE-2004-0908</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0909">CVE-2004-0909</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">Mozilla Security Advisory</uri>
+ <uri link="https://www.us-cert.gov/cas/techalerts/TA04-261A.html">US-CERT Security Alert TA04-261A</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902">CVE-2004-0902</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0903">CVE-2004-0903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904">CVE-2004-0904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0905">CVE-2004-0905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906">CVE-2004-0906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0907">CVE-2004-0907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908">CVE-2004-0908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0909">CVE-2004-0909</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 19 Sep 2004 12:09:02 +0000">
+ <metadata tag="submitter" timestamp="2004-09-19T12:09:02Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 15:58:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T15:58:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-27.xml b/glsa-200409-27.xml
index cb50058f..ca50fe5d 100644
--- a/glsa-200409-27.xml
+++ b/glsa-200409-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-27">
<title>glFTPd: Local buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">glftpd</product>
- <announced>September 21, 2004</announced>
- <revised>September 21, 2004: 01</revised>
+ <announced>2004-09-21</announced>
+ <revised>2004-09-21: 01</revised>
<bug>64809</bug>
<access>local</access>
<affected>
@@ -51,17 +50,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-ftp/glftpd-1.32-r1"
- # emerge ">=net-ftp/glftpd-1.32-r1"</code>
+ # emerge -pv "&gt;=net-ftp/glftpd-1.32-r1"
+ # emerge "&gt;=net-ftp/glftpd-1.32-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/375775/2004-09-17/2004-09-23/0">BugTraq Advisory</uri>
<uri link="http://www.glftpd.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=23&amp;mode=thread&amp;order=0&amp;thold=0">glFTPd Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 03:12:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T03:12:24Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 03:12:31 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T03:12:31Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-28.xml b/glsa-200409-28.xml
index 6ff33fe8..d9bb4968 100644
--- a/glsa-200409-28.xml
+++ b/glsa-200409-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-28">
<title>GTK+ 2, gdk-pixbuf: Multiple image decoding vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gtk+</product>
- <announced>September 21, 2004</announced>
- <revised>September 21, 2004: 01</revised>
+ <announced>2004-09-21</announced>
+ <revised>2004-09-21: 01</revised>
<bug>64230</bug>
<access>remote</access>
<affected>
@@ -62,31 +61,31 @@
<code>
# emerge sync
- # emerge -pv ">=x11-libs/gtk+-2.4.9-r1"
- # emerge ">=x11-libs/gtk+-2.4.9-r1"</code>
+ # emerge -pv "&gt;=x11-libs/gtk+-2.4.9-r1"
+ # emerge "&gt;=x11-libs/gtk+-2.4.9-r1"</code>
<p>
All GdkPixbuf users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/gdk-pixbuf-0.22.0-r3"
- # emerge ">=media-libs/gdk-pixbuf-0.22.0-r3"</code>
+ # emerge -pv "&gt;=media-libs/gdk-pixbuf-0.22.0-r3"
+ # emerge "&gt;=media-libs/gdk-pixbuf-0.22.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753">CAN-2004-0753</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782">CAN-2004-0782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783">CAN-2004-0783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788">CAN-2004-0788</uri>
- <uri link="http://bugzilla.gnome.org/show_bug.cgi?id=150601">GNOME Bug 150601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753">CAN-2004-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782">CAN-2004-0782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783">CAN-2004-0783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788">CAN-2004-0788</uri>
+ <uri link="https://bugzilla.gnome.org/show_bug.cgi?id=150601">GNOME Bug 150601</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 06:35:32 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T06:35:32Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 11:29:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T11:29:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 13:51:30 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T13:51:30Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200409-29.xml b/glsa-200409-29.xml
index cc41ce09..51161d8b 100644
--- a/glsa-200409-29.xml
+++ b/glsa-200409-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-29">
<title>FreeRADIUS: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
FreeRADIUS.
</synopsis>
<product type="ebuild">FreeRADIUS</product>
- <announced>September 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60587</bug>
<access>remote</access>
<affected>
@@ -49,22 +48,22 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-dialup/freeradius-1.0.1&quot;
- # emerge &quot;&gt;=net-dialup/freeradius-1.0.1&quot;</code>
+ # emerge -pv "&gt;=net-dialup/freeradius-1.0.1"
+ # emerge "&gt;=net-dialup/freeradius-1.0.1"</code>
</resolution>
<references>
- <uri link="http://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938">CVE-2004-0938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960">CVE-2004-0960</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0961">CVE-2004-0961</uri>
+ <uri link="https://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938">CVE-2004-0938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960">CVE-2004-0960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0961">CVE-2004-0961</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 13:27:45 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T13:27:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 15:22:58 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T15:22:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 11:24:01 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T11:24:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-30.xml b/glsa-200409-30.xml
index 2353d7ac..f05c9eb6 100644
--- a/glsa-200409-30.xml
+++ b/glsa-200409-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-30">
<title>xine-lib: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>September 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64348</bug>
<access>remote</access>
<affected>
@@ -57,23 +56,23 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc6&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc6&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc6"
+ # emerge "&gt;=media-libs/xine-lib-1_rc6"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0">BugTraq Announcement (XSA-2004-4)</uri>
<uri link="http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0">BugTraq Announcement (XSA-2004-5)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1379">CVE-2004-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476">CVE-2004-1476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1379">CVE-2004-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476">CVE-2004-1476</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 06:34:44 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T06:34:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 20:55:54 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T20:55:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2004 11:19:16 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-22T11:19:16Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-31.xml b/glsa-200409-31.xml
index b1e2d66f..09aa2b7b 100644
--- a/glsa-200409-31.xml
+++ b/glsa-200409-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-31">
<title>jabberd 1.x: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">jabberd</product>
- <announced>September 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64741</bug>
<access>remote</access>
<affected>
@@ -50,21 +49,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/jabberd-1.4.3-r4&quot;
- # emerge &quot;&gt;=net-im/jabberd-1.4.3-r4&quot;</code>
+ # emerge -pv "&gt;=net-im/jabberd-1.4.3-r4"
+ # emerge "&gt;=net-im/jabberd-1.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://www.jabber.org/pipermail/jabberd/2004-September/002004.html">Vulnerability disclosure</uri>
- <uri link="http://www.jabber.org/pipermail/jadmin/2004-September/018046.html">Jabber announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1378">CVE-2004-1378</uri>
+ <uri link="https://www.jabber.org/pipermail/jabberd/2004-September/002004.html">Vulnerability disclosure</uri>
+ <uri link="https://www.jabber.org/pipermail/jadmin/2004-September/018046.html">Jabber announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1378">CVE-2004-1378</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Sep 2004 11:27:04 +0000">
+ <metadata tag="requester" timestamp="2004-09-21T11:27:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T15:51:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2004 17:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-22T17:38:09Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-32.xml b/glsa-200409-32.xml
index bd80339b..f6084efd 100644
--- a/glsa-200409-32.xml
+++ b/glsa-200409-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-32">
<title>getmail: Filesystem overwrite vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
can be escalated further and possibly lead to a complete system compromise.
</synopsis>
<product type="ebuild">getmail</product>
- <announced>September 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64643</bug>
<access>local</access>
<affected>
@@ -54,19 +53,19 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-mail/getmail-4.2.0&quot;
- # emerge &quot;&gt;=net-mail/getmail-4.2.0&quot;</code>
+ # emerge -pv "&gt;=net-mail/getmail-4.2.0"
+ # emerge "&gt;=net-mail/getmail-4.2.0"</code>
</resolution>
<references>
<uri link="http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG">getmail ChangeLog</uri>
- <uri link="http://article.gmane.org/gmane.mail.getmail.user/1430">getmail Mailing List</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0880">CVE-2004-0880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0881">CVE-2004-0881</uri>
+ <uri link="https://article.gmane.org/gmane.mail.getmail.user/1430">getmail Mailing List</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0880">CVE-2004-0880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0881">CVE-2004-0881</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 21:51:14 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T21:51:14Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 21:52:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T21:52:24Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-33.xml b/glsa-200409-33.xml
index 498b7aec..aa79eea5 100644
--- a/glsa-200409-33.xml
+++ b/glsa-200409-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-33">
<title>Apache: Exposure of protected directories</title>
<synopsis>
@@ -8,8 +7,8 @@
exposure of protected directories to unauthorized users.
</synopsis>
<product type="ebuild">net=www/apache</product>
- <announced>September 24, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-09-24</announced>
+ <revised>2007-12-30: 02</revised>
<bug>64804</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.51-r1"
- # emerge ">=www-servers/apache-2.0.51-r1"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.51-r1"
+ # emerge "&gt;=www-servers/apache-2.0.51-r1"</code>
</resolution>
<references>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=31315">Apache Bug #31315</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811">CAN-2004-0811</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=31315">Apache Bug #31315</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811">CAN-2004-0811</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 16:24:09 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T16:24:09Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Sep 2004 04:13:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-24T04:13:15Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200409-34.xml b/glsa-200409-34.xml
index cbfeaf56..022ee134 100644
--- a/glsa-200409-34.xml
+++ b/glsa-200409-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-34">
<title>X.org, XFree86: Integer and stack overflows in libXpm</title>
<synopsis>
@@ -10,8 +9,8 @@
potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">X</product>
- <announced>September 27, 2004</announced>
- <revised>May 27, 2006: 02</revised>
+ <announced>2004-09-27</announced>
+ <revised>2006-05-27: 02</revised>
<bug>64152</bug>
<access>remote</access>
<affected>
@@ -62,16 +61,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-base/xorg-x11-6.7.0-r2&quot;
- # emerge &quot;&gt;=x11-base/xorg-x11-6.7.0-r2&quot;</code>
+ # emerge -pv "&gt;=x11-base/xorg-x11-6.7.0-r2"
+ # emerge "&gt;=x11-base/xorg-x11-6.7.0-r2"</code>
<p>
All XFree86 users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-base/xfree-4.3.0-r7&quot;
- # emerge &quot;&gt;=x11-base/xfree-4.3.0-r7&quot;</code>
+ # emerge -pv "&gt;=x11-base/xfree-4.3.0-r7"
+ # emerge "&gt;=x11-base/xfree-4.3.0-r7"</code>
<p>
Note: Usage of XFree86 is deprecated on the AMD64, HPPA, IA64, MIPS,
PPC and SPARC architectures: XFree86 users on those architectures
@@ -79,18 +78,18 @@
</p>
</resolution>
<references>
- <uri link="http://freedesktop.org/pipermail/xorg/2004-September/003196.html">X.org Security Advisory</uri>
- <uri link="http://freedesktop.org/pipermail/xorg/2004-September/003172.html">X11R6.8.1 Release Notes</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://freedesktop.org/pipermail/xorg/2004-September/003196.html">X.org Security Advisory</uri>
+ <uri link="https://freedesktop.org/pipermail/xorg/2004-September/003172.html">X11R6.8.1 Release Notes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Sep 2004 17:10:48 +0000">
+ <metadata tag="requester" timestamp="2004-09-18T17:10:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 05:29:54 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T05:29:54Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Sep 2004 20:54:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-26T20:54:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200409-35.xml b/glsa-200409-35.xml
index 006ce473..90f8d1e3 100644
--- a/glsa-200409-35.xml
+++ b/glsa-200409-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-35">
<title>Subversion: Metadata information leak</title>
<synopsis>
@@ -8,8 +7,8 @@
protected areas to be leaked to unauthorized users.
</synopsis>
<product type="ebuild">Subversion</product>
- <announced>September 29, 2004</announced>
- <revised>September 29, 2004: 01</revised>
+ <announced>2004-09-29</announced>
+ <revised>2004-09-29: 01</revised>
<bug>65085</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/subversion-1.0.8"
- # emerge ">=dev-util/subversion-1.0.8"</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.8"
+ # emerge "&gt;=dev-util/subversion-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0749">CAN-2004-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0749">CAN-2004-0749</uri>
<uri link="http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt">Subversion Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Sep 2004 08:34:50 +0000">
+ <metadata tag="requester" timestamp="2004-09-27T08:34:50Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Sep 2004 23:33:38 +0000">
+ <metadata tag="submitter" timestamp="2004-09-27T23:33:38Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Sep 2004 19:12:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-29T19:12:44Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-01.xml b/glsa-200410-01.xml
index bc8eb479..9036c183 100644
--- a/glsa-200410-01.xml
+++ b/glsa-200410-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-01">
<title>sharutils: Buffer overflows in shar.c and unshar.c</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">sharutils</product>
- <announced>October 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>65773</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/sharutils-4.2.1-r10&quot;
- # emerge &quot;&gt;=app-arch/sharutils-4.2.1-r10&quot;</code>
+ # emerge -pv "&gt;=app-arch/sharutils-4.2.1-r10"
+ # emerge "&gt;=app-arch/sharutils-4.2.1-r10"</code>
</resolution>
<references>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904">Debian Bug #265904</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1773">CVE-2004-1773</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904">Debian Bug #265904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1773">CVE-2004-1773</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Sep 2004 04:54:59 +0000">
+ <metadata tag="requester" timestamp="2004-09-30T04:54:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Sep 2004 18:01:09 +0000">
+ <metadata tag="submitter" timestamp="2004-09-30T18:01:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 1 Oct 2004 08:08:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-01T08:08:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200410-02.xml b/glsa-200410-02.xml
index 8b28b749..f88fc0a0 100644
--- a/glsa-200410-02.xml
+++ b/glsa-200410-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-02">
<title>Netpbm: Multiple temporary file issues</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>October 04, 2004</announced>
- <revised>October 04, 2004: 01</revised>
+ <announced>2004-10-04</announced>
+ <revised>2004-10-04: 01</revised>
<bug>65647</bug>
<access>local</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/netpbm-10.0"
- # emerge ">=media-libs/netpbm-10.0"</code>
+ # emerge -pv "&gt;=media-libs/netpbm-10.0"
+ # emerge "&gt;=media-libs/netpbm-10.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924">CVE-2003-0924</uri>
- <uri link="http://www.kb.cert.org/vuls/id/487102">US-CERT VU#487102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924">CVE-2003-0924</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/487102">US-CERT VU#487102</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 2 Oct 2004 00:18:31 +0000">
+ <metadata tag="requester" timestamp="2004-10-02T00:18:31Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 3 Oct 2004 10:07:45 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-03T10:07:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 3 Oct 2004 13:46:27 +0000">
+ <metadata tag="submitter" timestamp="2004-10-03T13:46:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-03.xml b/glsa-200410-03.xml
index 47d44514..f0d45ced 100644
--- a/glsa-200410-03.xml
+++ b/glsa-200410-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-03">
<title>NetKit-telnetd: buffer overflows in telnet and telnetd</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges and compromise the system.
</synopsis>
<product type="ebuild">netkit-telnetd</product>
- <announced>October 05, 2004</announced>
- <revised>October 05, 2004: 01</revised>
+ <announced>2004-10-05</announced>
+ <revised>2004-10-05: 01</revised>
<bug>64632</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/netkit-telnetd-0.17-r4"
- # emerge ">=net-misc/netkit-telnetd-0.17-r4"</code>
+ # emerge -pv "&gt;=net-misc/netkit-telnetd-0.17-r4"
+ # emerge "&gt;=net-misc/netkit-telnetd-0.17-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0554">CVE-2001-0554</uri>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=264846">Debian Bug #264846</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0554">CVE-2001-0554</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=264846">Debian Bug #264846</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 4 Oct 2004 14:59:18 +0000">
+ <metadata tag="requester" timestamp="2004-10-04T14:59:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 4 Oct 2004 16:13:52 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-04T16:13:52Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Tue, 5 Oct 2004 14:10:00 +0000">
+ <metadata tag="submitter" timestamp="2004-10-05T14:10:00Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200410-04.xml b/glsa-200410-04.xml
index 05ee584b..33074e83 100644
--- a/glsa-200410-04.xml
+++ b/glsa-200410-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-04">
<title>PHP: Memory disclosure and arbitrary location file upload</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to upload files to arbitrary locations.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>October 06, 2004</announced>
- <revised>October 06, 2004: 01</revised>
+ <announced>2004-10-06</announced>
+ <revised>2004-10-06: 01</revised>
<bug>64223</bug>
<access>remote</access>
<affected>
@@ -65,27 +64,27 @@
<code>
# emerge sync
- # emerge -pv ">=dev-php/php-4.3.9"
- # emerge ">=dev-php/php-4.3.9"
+ # emerge -pv "&gt;=dev-php/php-4.3.9"
+ # emerge "&gt;=dev-php/php-4.3.9"
- # emerge -pv ">=dev-php/mod_php-4.3.9"
- # emerge ">=dev-php/mod_php-4.3.9"
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.9"
+ # emerge "&gt;=dev-php/mod_php-4.3.9"
- # emerge -pv ">=dev-php/php-cgi-4.3.9"
- # emerge ">=dev-php/php-cgi-4.3.9"</code>
+ # emerge -pv "&gt;=dev-php/php-cgi-4.3.9"
+ # emerge "&gt;=dev-php/php-cgi-4.3.9"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12560/">Secunia Advisory</uri>
+ <uri link="https://secunia.com/advisories/12560/">Secunia Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/375294">BugTraq post regarding the php_variables.c issue</uri>
<uri link="http://www.securityfocus.com/archive/1/375370">BugTraq post regarding the rfc1867.c issue</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Sep 2004 20:40:17 +0000">
+ <metadata tag="requester" timestamp="2004-09-29T20:40:17Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Sep 2004 20:25:12 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-30T20:25:12Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 3 Oct 2004 18:04:56 +0000">
+ <metadata tag="submitter" timestamp="2004-10-03T18:04:56Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200410-05.xml b/glsa-200410-05.xml
index af011696..d2649f17 100644
--- a/glsa-200410-05.xml
+++ b/glsa-200410-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-05">
<title>Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
completely compromise the vulnerable system.
</synopsis>
<product type="ebuild">Cyrus-SASL</product>
- <announced>October 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56016</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-libs/cyrus-sasl-2.1.18-r2&quot;
- # emerge &quot;&gt;=dev-libs/cyrus-sasl-2.1.18-r2&quot;</code>
+ # emerge -pv "&gt;=dev-libs/cyrus-sasl-2.1.18-r2"
+ # emerge "&gt;=dev-libs/cyrus-sasl-2.1.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884">CAN-2004-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373">CVE-2005-0373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884">CAN-2004-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373">CVE-2005-0373</uri>
</references>
<metadata tag="submitter">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 2 Oct 2004 04:16:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-02T04:16:09Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-06.xml b/glsa-200410-06.xml
index 4e00f753..855e26ac 100644
--- a/glsa-200410-06.xml
+++ b/glsa-200410-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-06">
<title>CUPS: Leakage of sensitive information</title>
<synopsis>
@@ -8,8 +7,8 @@
printing to SMB-shared printers which require authentication.
</synopsis>
<product type="ebuild">cups</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66501</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/cups-1.1.20-r3"
- # emerge ">=net-print/cups-1.1.20-r3"</code>
+ # emerge -pv "&gt;=net-print/cups-1.1.20-r3"
+ # emerge "&gt;=net-print/cups-1.1.20-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923">CAN-2004-0923</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923">CAN-2004-0923</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 8 Oct 2004 18:27:07 +0000">
+ <metadata tag="submitter" timestamp="2004-10-08T18:27:07Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:07:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:07:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-07.xml b/glsa-200410-07.xml
index 7d7bc692..1f513a9b 100644
--- a/glsa-200410-07.xml
+++ b/glsa-200410-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-07">
<title>ed: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
of the user running ed, which could be the root user.
</synopsis>
<product type="ebuild">ed</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66400</bug>
<access>local</access>
<affected>
@@ -52,19 +51,19 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/ed-0.2-r4"
- # emerge ">=sys-apps/ed-0.2-r4"</code>
+ # emerge -pv "&gt;=sys-apps/ed-0.2-r4"
+ # emerge "&gt;=sys-apps/ed-0.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1137">CVE-2000-1137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1137">CVE-2000-1137</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:10:12 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:10:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:10:49 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:10:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 9 Oct 2004 09:43:17 +0000">
+ <metadata tag="submitter" timestamp="2004-10-09T09:43:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-08.xml b/glsa-200410-08.xml
index d2b5ae40..12dac3bb 100644
--- a/glsa-200410-08.xml
+++ b/glsa-200410-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-08">
<title>ncompress: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
the rights of the daemon process.
</synopsis>
<product type="ebuild">ncompress</product>
- <announced>October 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66251</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/ncompress-4.2.4-r1&quot;
- # emerge &quot;&gt;=app-arch/ncompress-4.2.4-r1&quot;</code>
+ # emerge -pv "&gt;=app-arch/ncompress-4.2.4-r1"
+ # emerge "&gt;=app-arch/ncompress-4.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/176363">US-CERT Vulnerability Note VU#176363</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1413">CVE-2001-1413</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/176363">US-CERT Vulnerability Note VU#176363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1413">CVE-2001-1413</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:09:39 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:09:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:11:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:11:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 9 Oct 2004 10:24:20 +0000">
+ <metadata tag="submitter" timestamp="2004-10-09T10:24:20Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-09.xml b/glsa-200410-09.xml
index 8c2e86b1..c5ac9bd2 100644
--- a/glsa-200410-09.xml
+++ b/glsa-200410-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-09">
<title>LessTif: Integer and stack overflows in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">lesstif</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66647</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
<code>
# emerge sync
- # emerge -pv ">=x11-libs/lesstif-0.93.97"
- # emerge ">=x11-libs/lesstif-0.93.97"</code>
+ # emerge -pv "&gt;=x11-libs/lesstif-0.93.97"
+ # emerge "&gt;=x11-libs/lesstif-0.93.97"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</uri>
<uri link="http://www.lesstif.org/ReleaseNotes.html">LessTif Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 8 Oct 2004 16:33:39 +0000">
+ <metadata tag="submitter" timestamp="2004-10-08T16:33:39Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 9 Oct 2004 05:48:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-09T05:48:24Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-10.xml b/glsa-200410-10.xml
index 4cbc06db..35535da8 100644
--- a/glsa-200410-10.xml
+++ b/glsa-200410-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-10">
<title>gettext: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user running gettext, which could be the root user.
</synopsis>
<product type="ebuild">gettext</product>
- <announced>October 10, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-10-10</announced>
+ <revised>2006-05-22: 04</revised>
<bug>66355</bug>
<bug>85766</bug>
<access>local</access>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/gettext-0.14.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/gettext-0.14.1-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/advisories/7263">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966">CVE-2004-0966</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966">CVE-2004-0966</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Oct 2004 10:51:13 +0000">
+ <metadata tag="requester" timestamp="2004-10-10T10:51:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Oct 2004 10:51:21 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-10T10:51:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Oct 2004 21:46:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-10T21:46:28Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-11.xml b/glsa-200410-11.xml
index 88925e13..2f212017 100644
--- a/glsa-200410-11.xml
+++ b/glsa-200410-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-11">
<title>tiff: Buffer overflows in image decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user viewing a malicious image.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>October 13, 2004</announced>
- <revised>October 13, 2004: 01</revised>
+ <announced>2004-10-13</announced>
+ <revised>2004-10-13: 01</revised>
<access>remote</access>
<affected>
<package name="media-libs/tiff" auto="yes" arch="*">
@@ -57,8 +56,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/tiff-3.6.1-r2"
- # emerge ">=media-libs/tiff-3.6.1-r2"</code>
+ # emerge -pv "&gt;=media-libs/tiff-3.6.1-r2"
+ # emerge "&gt;=media-libs/tiff-3.6.1-r2"</code>
<p>
xv makes use of the tiff library and needs to be recompiled to receive the
new patched version of the library. All xv users should also upgrade to the
@@ -67,16 +66,16 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/xv-3.10a-r8"
- # emerge ">=media-gfx/xv-3.10a-r8"</code>
+ # emerge -pv "&gt;=media-gfx/xv-3.10a-r8"
+ # emerge "&gt;=media-gfx/xv-3.10a-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 11 Oct 2004 13:05:01 +0000">
+ <metadata tag="submitter" timestamp="2004-10-11T13:05:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Oct 2004 14:38:12 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-13T14:38:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-12.xml b/glsa-200410-12.xml
index b72044ef..c25cbd18 100644
--- a/glsa-200410-12.xml
+++ b/glsa-200410-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-12">
<title>WordPress: HTTP response splitting and XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>October 14, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-10-14</announced>
+ <revised>2006-05-22: 04</revised>
<bug>65798</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.2.2"</code>
</resolution>
<references>
- <uri link="http://wordpress.org/development/2004/12/one-point-two-two/">WordPress 1.2.2 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584">CVE-2004-1584</uri>
+ <uri link="https://wordpress.org/development/2004/12/one-point-two-two/">WordPress 1.2.2 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584">CVE-2004-1584</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Oct 2004 11:43:21 +0000">
+ <metadata tag="requester" timestamp="2004-10-12T11:43:21Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Oct 2004 11:44:27 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-12T11:44:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Oct 2004 21:40:26 +0000">
+ <metadata tag="submitter" timestamp="2004-10-12T21:40:26Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-13.xml b/glsa-200410-13.xml
index b5bbb24f..d1e21c0c 100644
--- a/glsa-200410-13.xml
+++ b/glsa-200410-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-13">
<title>BNC: Input validation flaw</title>
<synopsis>
@@ -8,8 +7,8 @@
to issue arbitrary IRC related commands.
</synopsis>
<product type="ebuild">bnc</product>
- <announced>October 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66912</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-irc/bnc-2.8.9&quot;
- # emerge &quot;&gt;=net-irc/bnc-2.8.9&quot;</code>
+ # emerge -pv "&gt;=net-irc/bnc-2.8.9"
+ # emerge "&gt;=net-irc/bnc-2.8.9"</code>
</resolution>
<references>
<uri link="http://www.gotbnc.com/changes.html#2.8.9">BNC Changes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1482">CVE-2004-1482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1482">CVE-2004-1482</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Oct 2004 11:44:17 +0000">
+ <metadata tag="requester" timestamp="2004-10-12T11:44:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Oct 2004 11:44:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-12T11:44:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Oct 2004 08:51:33 +0000">
+ <metadata tag="submitter" timestamp="2004-10-13T08:51:33Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200410-14.xml b/glsa-200410-14.xml
index e7c9dbb2..42ac75ae 100644
--- a/glsa-200410-14.xml
+++ b/glsa-200410-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-14">
<title>phpMyAdmin: Vulnerability in MIME-based transformation system</title>
<synopsis>
@@ -9,8 +8,8 @@
"safe mode" is disabled.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>October 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>67409</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;
- # emerge &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;</code>
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.6.0_p2"
+ # emerge "&gt;=dev-db/phpmyadmin-2.6.0_p2"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=414281">phpMyAdmin 2.6.0_pl2 Release Announcement</uri>
- <uri link="http://secunia.com/advisories/12813/">Secunia Advisory SA12813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2630">CVE-2004-2630</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=414281">phpMyAdmin 2.6.0_pl2 Release Announcement</uri>
+ <uri link="https://secunia.com/advisories/12813/">Secunia Advisory SA12813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2630">CVE-2004-2630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Oct 2004 19:19:23 +0000">
+ <metadata tag="requester" timestamp="2004-10-14T19:19:23Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Oct 2004 10:34:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-16T10:34:28Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Oct 2004 17:40:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-17T17:40:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-15.xml b/glsa-200410-15.xml
index a84b6a9b..b4284006 100644
--- a/glsa-200410-15.xml
+++ b/glsa-200410-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-15">
<title>Squid: Remote DoS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
denial of service.
</synopsis>
<product type="ebuild">squid</product>
- <announced>October 18, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-10-18</announced>
+ <revised>2007-12-30: 03</revised>
<bug>67167</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-proxy/squid-2.5.7&quot;
- # emerge &quot;&gt;=net-proxy/squid-2.5.7&quot;</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.7"
+ # emerge "&gt;=net-proxy/squid-2.5.7"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=152&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918">CVE-2004-0918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918">CVE-2004-0918</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Oct 2004 17:38:48 +0000">
+ <metadata tag="requester" timestamp="2004-10-17T17:38:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Oct 2004 17:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-17T17:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 17 Oct 2004 18:44:11 +0000">
+ <metadata tag="submitter" timestamp="2004-10-17T18:44:11Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-16.xml b/glsa-200410-16.xml
index b815fb6b..0e70f2d7 100644
--- a/glsa-200410-16.xml
+++ b/glsa-200410-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-16">
<title>PostgreSQL: Insecure temporary file use in make_oidjoins_check</title>
<synopsis>
@@ -9,8 +8,8 @@
overwrite arbitrary files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">PostgreSQL</product>
- <announced>October 18, 2004</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2004-10-18</announced>
+ <revised>2009-05-28: 04</revised>
<bug>66371</bug>
<access>local</access>
<affected>
@@ -58,21 +57,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/postgresql-7.4.5-r2&quot;
- # emerge &quot;&gt;=dev-db/postgresql-7.4.5-r2&quot;</code>
+ # emerge -pv "&gt;=dev-db/postgresql-7.4.5-r2"
+ # emerge "&gt;=dev-db/postgresql-7.4.5-r2"</code>
<p>
Upgrade notes: PostgreSQL 7.3.x users should upgrade to the latest
available 7.3.x version to retain database compatibility.
</p>
</resolution>
<references>
- <uri link="http://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</uri>
+ <uri link="https://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Oct 2004 13:31:59 +0000">
+ <metadata tag="submitter" timestamp="2004-10-18T13:31:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Oct 2004 13:32:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-18T13:32:56Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-17.xml b/glsa-200410-17.xml
index 9520c5a5..f5ac3e2d 100644
--- a/glsa-200410-17.xml
+++ b/glsa-200410-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-17">
<title>OpenOffice.org: Temporary files disclosure</title>
<synopsis>
@@ -9,8 +8,8 @@
documents.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>October 20, 2004</announced>
- <revised>October 20, 2004: 01</revised>
+ <announced>2004-10-20</announced>
+ <revised>2004-10-20: 01</revised>
<bug>63556</bug>
<access>local</access>
<affected>
@@ -63,8 +62,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.3"
- # emerge ">=app-office/openoffice-1.1.3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.3"
+ # emerge "&gt;=app-office/openoffice-1.1.3"</code>
<p>
All affected OpenOffice.org binary users should upgrade to the latest
version:
@@ -72,8 +71,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-bin-1.1.3"
- # emerge ">=app-office/openoffice-bin-1.1.3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-bin-1.1.3"
+ # emerge "&gt;=app-office/openoffice-bin-1.1.3"</code>
<p>
All affected OpenOffice.org Ximian users should upgrade to the latest
version:
@@ -81,20 +80,20 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-ximian-1.3.4"
- # emerge ">=app-office/openoffice-1.3.4"</code>
+ # emerge -pv "&gt;=app-office/openoffice-ximian-1.3.4"
+ # emerge "&gt;=app-office/openoffice-1.3.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752">CAN-2004-0752</uri>
- <uri link="http://www.openoffice.org/issues/show_bug.cgi?id=33357">OpenOffice.org Issue 33357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752">CAN-2004-0752</uri>
+ <uri link="https://www.openoffice.org/issues/show_bug.cgi?id=33357">OpenOffice.org Issue 33357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Oct 2004 17:29:15 +0000">
+ <metadata tag="requester" timestamp="2004-10-18T17:29:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 09:04:12 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T09:04:12Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Oct 2004 12:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-19T12:14:40Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-18.xml b/glsa-200410-18.xml
index 396bc29c..aa02a924 100644
--- a/glsa-200410-18.xml
+++ b/glsa-200410-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-18">
<title>Ghostscript: Insecure temporary file use in multiple scripts</title>
<synopsis>
@@ -9,8 +8,8 @@
with the rights of the user running the script.
</synopsis>
<product type="ebuild">Ghostscript</product>
- <announced>October 20, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-10-20</announced>
+ <revised>2007-12-30: 02</revised>
<bug>66357</bug>
<access>local</access>
<affected>
@@ -55,8 +54,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/ghostscript-esp-7.07.1-r7"
- # emerge ">=app-text/ghostscript-esp-7.07.1-r7"</code>
+ # emerge -pv "&gt;=app-text/ghostscript-esp-7.07.1-r7"
+ # emerge "&gt;=app-text/ghostscript-esp-7.07.1-r7"</code>
<p>
Ghostscript users on the PPC architecture should upgrade to the latest
stable version on their architecture:
@@ -64,16 +63,16 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/ghostscript-esp-7.05.6-r2"
- # emerge ">=app-text/ghostscript-esp-7.05.6-r2"</code>
+ # emerge -pv "&gt;=app-text/ghostscript-esp-7.05.6-r2"
+ # emerge "&gt;=app-text/ghostscript-esp-7.05.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0967">CAN-2004-0967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0967">CAN-2004-0967</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 12:27:11 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T12:27:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Oct 2004 12:27:18 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-19T12:27:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-19.xml b/glsa-200410-19.xml
index d59b7642..4da854ef 100644
--- a/glsa-200410-19.xml
+++ b/glsa-200410-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-19">
<title>glibc: Insecure tempfile handling in catchsegv script</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user running the script.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>October 21, 2004</announced>
- <revised>October 21, 2004: 01</revised>
+ <announced>2004-10-21</announced>
+ <revised>2004-10-21: 01</revised>
<bug>66358</bug>
<access>local</access>
<affected>
@@ -59,15 +58,15 @@
# emerge sys-libs/glibc</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968">CAN-2004-0968</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968">CAN-2004-0968</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Oct 2004 14:29:16 +0000">
+ <metadata tag="requester" timestamp="2004-10-20T14:29:16Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Oct 2004 14:29:39 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-20T14:29:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Oct 2004 16:11:58 +0000">
+ <metadata tag="submitter" timestamp="2004-10-20T16:11:58Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-20.xml b/glsa-200410-20.xml
index 1afa3db5..6d74eea6 100644
--- a/glsa-200410-20.xml
+++ b/glsa-200410-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-20">
<title>Xpdf, CUPS: Multiple integer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
includes Xpdf code and therefore is vulnerable to the same issues.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>October 21, 2004</announced>
- <revised>November 06, 2004: 02</revised>
+ <announced>2004-10-21</announced>
+ <revised>2004-11-06: 02</revised>
<bug>69662</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r5"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r5"</code>
<p>
All CUPS users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.20-r5"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.20-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Oct 2004 10:10:18 +0000">
+ <metadata tag="submitter" timestamp="2004-10-21T10:10:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Oct 2004 14:18:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-21T14:18:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-21.xml b/glsa-200410-21.xml
index 6fb13f18..216ced9c 100644
--- a/glsa-200410-21.xml
+++ b/glsa-200410-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-21">
<title>Apache 2, mod_ssl: Bypass of SSLCipherSuite directive</title>
<synopsis>
@@ -8,8 +7,8 @@
the "SSLCipherSuite" directive of mod_ssl.
</synopsis>
<product type="ebuild">apache</product>
- <announced>October 21, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-10-21</announced>
+ <revised>2007-12-30: 02</revised>
<bug>66807</bug>
<access>remote</access>
<affected>
@@ -56,28 +55,28 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.52"
- # emerge ">=www-servers/apache-2.0.52"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.52"
+ # emerge "&gt;=www-servers/apache-2.0.52"</code>
<p>
All mod_ssl users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.20"
- # emerge ">=net-www/mod_ssl-2.8.20"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.20"
+ # emerge "&gt;=net-www/mod_ssl-2.8.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885">CAN-2004-0885</uri>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=31505">Apache HTTPD Bug 31505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885">CAN-2004-0885</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=31505">Apache HTTPD Bug 31505</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:14:18 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:14:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Oct 2004 20:52:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-13T20:52:28Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Oct 2004 04:34:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-21T04:34:44Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-22.xml b/glsa-200410-22.xml
index b71b0f38..bb5f9005 100644
--- a/glsa-200410-22.xml
+++ b/glsa-200410-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-22">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially remote arbitrary code execution have been discovered in MySQL.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>October 24, 2004</announced>
- <revised>October 24, 2004: 01</revised>
+ <announced>2004-10-24</announced>
+ <revised>2004-10-24: 01</revised>
<bug>67062</bug>
<access>remote</access>
<affected>
@@ -67,23 +66,23 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.21"
- # emerge ">=dev-db/mysql-4.0.21"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.21"
+ # emerge "&gt;=dev-db/mysql-4.0.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835">CAN-2004-0835</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836">CAN-2004-0836</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837">CAN-2004-0837</uri>
- <uri link="http://bugs.mysql.com/bug.php?id=3933">Privilege granting bug</uri>
- <uri link="http://bugs.mysql.com/bug.php?id=3870">MATCH ... AGAINST crash bug</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835">CAN-2004-0835</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836">CAN-2004-0836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837">CAN-2004-0837</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=3933">Privilege granting bug</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=3870">MATCH ... AGAINST crash bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Oct 2004 17:45:22 +0000">
+ <metadata tag="requester" timestamp="2004-10-19T17:45:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Oct 2004 20:06:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-22T20:06:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Oct 2004 08:53:17 +0000">
+ <metadata tag="submitter" timestamp="2004-10-23T08:53:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-23.xml b/glsa-200410-23.xml
index 852f1fcd..86e1abb1 100644
--- a/glsa-200410-23.xml
+++ b/glsa-200410-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-23">
<title>Gaim: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the application, or possibly execute arbitrary code.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>October 24, 2004</announced>
- <revised>October 24, 2004: 01</revised>
+ <announced>2004-10-24</announced>
+ <revised>2004-10-24: 01</revised>
<bug>68271</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-im/gaim-1.0.2"
- # emerge ">=net-im/gaim-1.0.2"</code>
+ # emerge -pv "&gt;=net-im/gaim-1.0.2"
+ # emerge "&gt;=net-im/gaim-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891">CAN-2004-0891</uri>
- <uri link="http://gaim.sourceforge.net/security/">Gaim Security Issues</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891">CAN-2004-0891</uri>
+ <uri link="https://gaim.sourceforge.net/security/">Gaim Security Issues</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Oct 2004 00:52:11 +0000">
+ <metadata tag="requester" timestamp="2004-10-22T00:52:11Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Oct 2004 08:35:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-22T08:35:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Oct 2004 13:06:09 +0000">
+ <metadata tag="submitter" timestamp="2004-10-23T13:06:09Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200410-24.xml b/glsa-200410-24.xml
index acda5ccb..704c6031 100644
--- a/glsa-200410-24.xml
+++ b/glsa-200410-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-24">
<title>MIT krb5: Insecure temporary file use in send-pr.sh</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>October 25, 2004</announced>
- <revised>January 30, 2005: 02</revised>
+ <announced>2004-10-25</announced>
+ <revised>2005-01-30: 02</revised>
<bug>66359</bug>
<access>local</access>
<affected>
@@ -54,16 +53,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;
- # emerge &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.4-r1"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0971">CAN-2004-0971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0971">CAN-2004-0971</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 17:38:41 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T17:38:41Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:03:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-25.xml b/glsa-200410-25.xml
index 883f0f9b..6900e4ca 100644
--- a/glsa-200410-25.xml
+++ b/glsa-200410-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-25">
<title>Netatalk: Insecure tempfile handling in etc2ps.sh</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">Netatalk</product>
- <announced>October 25, 2004</announced>
- <revised>October 25, 2004: 01</revised>
+ <announced>2004-10-25</announced>
+ <revised>2004-10-25: 01</revised>
<bug>66370</bug>
<access>local</access>
<affected>
@@ -52,16 +51,16 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/netatalk-1.6.4-r1"
- # emerge ">=net-fs/netatalk-1.6.4-r1"</code>
+ # emerge -pv "&gt;=net-fs/netatalk-1.6.4-r1"
+ # emerge "&gt;=net-fs/netatalk-1.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974">CAN-2004-0974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974">CAN-2004-0974</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 10 Oct 2004 22:02:01 +0000">
+ <metadata tag="submitter" timestamp="2004-10-10T22:02:01Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:03:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-26.xml b/glsa-200410-26.xml
index 4d7ebf36..23260bba 100644
--- a/glsa-200410-26.xml
+++ b/glsa-200410-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-26">
<title>socat: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
socat process.
</synopsis>
<product type="ebuild">socat</product>
- <announced>October 25, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68547</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/socat-1.4.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/socat-1.4.0.3"</code>
</resolution>
<references>
<uri link="http://www.dest-unreach.org/socat/advisory/socat-adv-1.html">socat Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1484">CVE-2004-1484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1484">CVE-2004-1484</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Oct 2004 13:12:08 +0000">
+ <metadata tag="requester" timestamp="2004-10-23T13:12:08Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Oct 2004 13:30:23 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-23T13:30:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Oct 2004 21:38:40 +0000">
+ <metadata tag="submitter" timestamp="2004-10-24T21:38:40Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200410-27.xml b/glsa-200410-27.xml
index fcbf0e80..167b81b6 100644
--- a/glsa-200410-27.xml
+++ b/glsa-200410-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-27">
<title>mpg123: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68343</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r5"</code>
</resolution>
<references>
<uri link="http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt">Security Advisory by Carlos Barros</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0982">CVE-2004-0982</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0982">CVE-2004-0982</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Oct 2004 21:04:17 +0000">
+ <metadata tag="requester" timestamp="2004-10-22T21:04:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Oct 2004 17:06:55 +0000">
+ <metadata tag="submitter" timestamp="2004-10-24T17:06:55Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Oct 2004 11:02:34 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-26T11:02:34Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200410-28.xml b/glsa-200410-28.xml
index ebe7955f..aa673823 100644
--- a/glsa-200410-28.xml
+++ b/glsa-200410-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-28">
<title>rssh: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
rssh restrictions.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66988</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh-2.2.2"</code>
</resolution>
<references>
<uri link="http://www.pizzashack.org/rssh/security.shtml">rssh security announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1628">CVE-2004-1628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1628">CVE-2004-1628</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Oct 2004 13:31:44 +0000">
+ <metadata tag="requester" timestamp="2004-10-25T13:31:44Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:31:54 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:31:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Oct 2004 13:24:10 +0000">
+ <metadata tag="submitter" timestamp="2004-10-26T13:24:10Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-29.xml b/glsa-200410-29.xml
index 101be6b3..dbafcbe1 100644
--- a/glsa-200410-29.xml
+++ b/glsa-200410-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-29">
<title>PuTTY: Pre-authentication buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code on the connecting client.
</synopsis>
<product type="ebuild">putty</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69123</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/putty-0.56&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/putty-0.56"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=155">iDEFENSE Security Advisory 10.27.04</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008">CVE-2004-1008</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008">CVE-2004-1008</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 15:40:45 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T15:40:45Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Oct 2004 15:40:58 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-27T15:40:58Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Oct 2004 16:43:51 +0000">
+ <metadata tag="submitter" timestamp="2004-10-27T16:43:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200410-30.xml b/glsa-200410-30.xml
index b4c1a098..96985ef7 100644
--- a/glsa-200410-30.xml
+++ b/glsa-200410-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-30">
<title>GPdf, KPDF, KOffice: Vulnerabilities in included xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
malicious PDF file.
</synopsis>
<product type="ebuild">GPdf</product>
- <announced>October 28, 2004</announced>
- <revised>November 06, 2004: 02</revised>
+ <announced>2004-10-28</announced>
+ <revised>2004-11-06: 02</revised>
<bug>68558</bug>
<bug>68665</bug>
<bug>68571</bug>
@@ -65,32 +64,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-text/gpdf-0.132-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-0.132-r2"</code>
<p>
All KDE users should upgrade to the latest version of kdegraphics:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.0-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.0-r2"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-office/koffice-1.3.3-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.3.3-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Oct 2004 18:40:10 +0000">
+ <metadata tag="requester" timestamp="2004-10-26T18:40:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Oct 2004 10:09:49 +0000">
+ <metadata tag="submitter" timestamp="2004-10-27T10:09:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Oct 2004 07:24:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-28T07:24:07Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200410-31.xml b/glsa-200410-31.xml
index b46e45f7..bf9a71dc 100644
--- a/glsa-200410-31.xml
+++ b/glsa-200410-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-31">
<title>Archive::Zip: Virus detection evasion</title>
<synopsis>
@@ -9,8 +8,8 @@
detection evasion.
</synopsis>
<product type="ebuild">Archive::Zip</product>
- <announced>October 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68616</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Archive-Zip-1.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Archive-Zip-1.14"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=153">iDEFENSE Security Advisory 10.18.04</uri>
- <uri link="http://rt.cpan.org/NoAuth/Bug.html?id=8077">rt.cpan.org bug #8077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1096">CVE-2004-1096</uri>
+ <uri link="https://rt.cpan.org/NoAuth/Bug.html?id=8077">rt.cpan.org bug #8077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1096">CVE-2004-1096</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 12:10:39 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T12:10:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Oct 2004 12:10:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-27T12:10:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 12:32:54 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T12:32:54Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-01.xml b/glsa-200411-01.xml
index b76836ff..710526a3 100644
--- a/glsa-200411-01.xml
+++ b/glsa-200411-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-01">
<title>ppp: No denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
but it cannot be used to deny service to other users.
</synopsis>
<product type="ebuild">ppp</product>
- <announced>November 01, 2004</announced>
- <revised>November 02, 2004: 02</revised>
+ <announced>2004-11-01</announced>
+ <revised>2004-11-02: 02</revised>
<bug>69152</bug>
<access>remote</access>
<affected>
@@ -48,13 +47,13 @@
<references>
<uri link="http://www.securityfocus.com/archive/1/379450">Incorrect BugTraq Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:32:16 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:32:16Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 10:32:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T10:32:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 1 Nov 2004 16:53:20 +0000">
+ <metadata tag="submitter" timestamp="2004-11-01T16:53:20Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-02.xml b/glsa-200411-02.xml
index 5fc972f7..d0b2018a 100644
--- a/glsa-200411-02.xml
+++ b/glsa-200411-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-02">
<title>Cherokee: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of service or the execution of arbitary code.
</synopsis>
<product type="ebuild">cherokee</product>
- <announced>November 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>67667</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/cherokee-0.4.17.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/cherokee-0.4.17.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1097">CVE-2004-1097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1097">CVE-2004-1097</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:17:11 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:17:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 11:49:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T11:49:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 1 Nov 2004 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2004-11-01T15:51:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-03.xml b/glsa-200411-03.xml
index 9a745734..3dd788f2 100644
--- a/glsa-200411-03.xml
+++ b/glsa-200411-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-03">
<title>Apache 1.3: Buffer overflow vulnerability in mod_include</title>
<synopsis>
@@ -8,8 +7,8 @@
allow a local attacker to gain escalated privileges.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 02, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-11-02</announced>
+ <revised>2007-12-30: 02</revised>
<bug>68564</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-1.3.32-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940">CAN-2004-0940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940">CAN-2004-0940</uri>
<uri link="http://www.apacheweek.com/features/security-13">Security vulnerabilities in Apache httpd 1.3</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 10:11:41 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T10:11:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 12:38:27 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T12:38:27Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 11:16:30 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T11:16:30Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200411-04.xml b/glsa-200411-04.xml
index d5f246e8..6b110a08 100644
--- a/glsa-200411-04.xml
+++ b/glsa-200411-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-04">
<title>Speedtouch USB driver: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
local users to execute arbitrary code with escalated privileges.
</synopsis>
<product type="ebuild">speedtouch</product>
- <announced>November 02, 2004</announced>
- <revised>November 02, 2004: 01</revised>
+ <announced>2004-11-02</announced>
+ <revised>2004-11-02: 01</revised>
<bug>68436</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-dialup/speedtouch-1.3.1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/speedtouch-1.3.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834">CAN-2004-0834</uri>
- <uri link="http://speedtouch.sourceforge.net/index.php?/news.en.html">Speedtouch Project News Announcements</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834">CAN-2004-0834</uri>
+ <uri link="https://speedtouch.sourceforge.net/index.php?/news.en.html">Speedtouch Project News Announcements</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Oct 2004 08:13:35 +0000">
+ <metadata tag="requester" timestamp="2004-10-29T08:13:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 13:15:40 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T13:15:40Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 13:27:33 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T13:27:33Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-05.xml b/glsa-200411-05.xml
index 4c92af0c..e1b3427d 100644
--- a/glsa-200411-05.xml
+++ b/glsa-200411-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-05">
<title>libxml2: Remotely exploitable buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>November 02, 2004</announced>
- <revised>November 02, 2004: 01</revised>
+ <announced>2004-11-02</announced>
+ <revised>2004-11-02: 01</revised>
<bug>69154</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.15"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.6.15"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379383">BugTraq Advisory</uri>
<uri link="http://www.xmlsoft.org/ChangeLog.html">libxml2 ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989">CAN-2004-0989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989">CAN-2004-0989</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Oct 2004 16:39:51 +0000">
+ <metadata tag="requester" timestamp="2004-10-30T16:39:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 Oct 2004 21:35:49 +0000">
+ <metadata tag="submitter" timestamp="2004-10-31T21:35:49Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 23:01:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T23:01:51Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-06.xml b/glsa-200411-06.xml
index 8671fe6b..af017f03 100644
--- a/glsa-200411-06.xml
+++ b/glsa-200411-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-06">
<title>MIME-tools: Virus detection evasion</title>
<synopsis>
@@ -9,8 +8,8 @@
viruses.
</synopsis>
<product type="ebuild">MIME-tools</product>
- <announced>November 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69181</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/MIME-tools-5.415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/MIME-tools-5.415"</code>
</resolution>
<references>
- <uri link="http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html">MIMEDefang announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1098">CVE-2004-1098</uri>
+ <uri link="https://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html">MIMEDefang announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1098">CVE-2004-1098</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 13:33:38 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T13:33:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 13:34:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T13:34:00Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 2 Nov 2004 17:50:24 +0000">
+ <metadata tag="submitter" timestamp="2004-11-02T17:50:24Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-07.xml b/glsa-200411-07.xml
index 98471006..fbad50e5 100644
--- a/glsa-200411-07.xml
+++ b/glsa-200411-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-07">
<title>Proxytunnel: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
Proxytunnel process.
</synopsis>
<product type="ebuild">Proxytunnel</product>
- <announced>November 03, 2004</announced>
- <revised>November 03, 2004: 01</revised>
+ <announced>2004-11-03</announced>
+ <revised>2004-11-03: 01</revised>
<bug>69379</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/proxytunnel-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0992">CAN-2004-0992</uri>
- <uri link="http://proxytunnel.sourceforge.net/news.html">Proxytunnel News</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0992">CAN-2004-0992</uri>
+ <uri link="https://proxytunnel.sourceforge.net/news.html">Proxytunnel News</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 21:56:56 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T21:56:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 09:32:39 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T09:32:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 3 Nov 2004 14:02:21 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-03T14:02:21Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-08.xml b/glsa-200411-08.xml
index be9b8726..078457b7 100644
--- a/glsa-200411-08.xml
+++ b/glsa-200411-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-08">
<title>GD: Integer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
program decoding a malicious PNG image.
</synopsis>
<product type="ebuild">GD</product>
- <announced>November 03, 2004</announced>
- <revised>November 03, 2004: 01</revised>
+ <announced>2004-11-03</announced>
+ <revised>2004-11-03: 01</revised>
<bug>69070</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.32"</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.32"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379382">Original BugTraq advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990">CAN-2004-0990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990">CAN-2004-0990</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:23:54 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:23:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 21:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T21:56:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 20:55:19 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T20:55:19Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-09.xml b/glsa-200411-09.xml
index 1876095e..0a2b29e2 100644
--- a/glsa-200411-09.xml
+++ b/glsa-200411-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-09">
<title>shadow: Unauthorized modification of account information</title>
<synopsis>
@@ -8,8 +7,8 @@
properties by unauthorized users.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>November 04, 2004</announced>
- <revised>November 05, 2004: 02</revised>
+ <announced>2004-11-04</announced>
+ <revised>2004-11-05: 02</revised>
<bug>69212</bug>
<access>local</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.5-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.0.5-r1"</code>
</resolution>
<references>
<uri link="http://ftp.pld.org.pl/software/shadow/NEWS">shadow NEWS file</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1001">CAN-2004-1001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1001">CAN-2004-1001</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 3 Nov 2004 20:36:10 +0000">
+ <metadata tag="requester" timestamp="2004-11-03T20:36:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 3 Nov 2004 20:36:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-03T20:36:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 21:01:01 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T21:01:01Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200411-10.xml b/glsa-200411-10.xml
index 16eab1e4..16bfcfc6 100644
--- a/glsa-200411-10.xml
+++ b/glsa-200411-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-10">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
Gallery is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 06, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69904</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.4.4_p4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.4.4_p4"</code>
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=142&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1106">CVE-2004-1106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1106">CVE-2004-1106</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 5 Nov 2004 01:49:40 +0000">
+ <metadata tag="submitter" timestamp="2004-11-05T01:49:40Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 09:24:41 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T09:24:41Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-11.xml b/glsa-200411-11.xml
index f8a886d5..3be22123 100644
--- a/glsa-200411-11.xml
+++ b/glsa-200411-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-11">
<title>ImageMagick: EXIF buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
information, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 06, 2004</announced>
- <revised>November 06, 2004: 01</revised>
+ <announced>2004-11-06</announced>
+ <revised>2004-11-06: 01</revised>
<bug>69825</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.3.2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.1.3.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981">CAN-2004-0981</uri>
- <uri link="http://www.imagemagick.org/www/Changelog.html">ImageMagick ChangeLog</uri>
- <uri link="http://secunia.com/advisories/12995/">SA 12995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981">CAN-2004-0981</uri>
+ <uri link="https://www.imagemagick.org/www/Changelog.html">ImageMagick ChangeLog</uri>
+ <uri link="https://secunia.com/advisories/12995/">SA 12995</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 5 Nov 2004 13:21:51 +0000">
+ <metadata tag="requester" timestamp="2004-11-05T13:21:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 6 Nov 2004 13:00:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-06T13:00:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 18:34:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T18:34:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-12.xml b/glsa-200411-12.xml
index e66d8583..0a757558 100644
--- a/glsa-200411-12.xml
+++ b/glsa-200411-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-12">
<title>zgv: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zgv</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69150</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/zgv-5.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/zgv-5.8"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379472">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1095">CVE-2004-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1095">CVE-2004-1095</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 6 Nov 2004 19:26:29 +0000">
+ <metadata tag="requester" timestamp="2004-11-06T19:26:29Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 20:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T20:47:51Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sat, 6 Nov 2004 21:08:18 +0000">
+ <metadata tag="submitter" timestamp="2004-11-06T21:08:18Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-13.xml b/glsa-200411-13.xml
index 45d38c7f..ba3644e0 100644
--- a/glsa-200411-13.xml
+++ b/glsa-200411-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-13">
<title>Portage, Gentoolkit: Temporary file vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
overwrite arbitrary files with the rights of the user running the script.
</synopsis>
<product type="ebuild">portage gentoolkit</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68846</bug>
<bug>69147</bug>
<access>local</access>
@@ -59,25 +58,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.0.51-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.0.51-r3"</code>
<p>
All Gentoolkit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-portage/gentoolkit-0.2.0_pre8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-portage/gentoolkit-0.2.0_pre8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1107">CVE-2004-1107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1108">CVE-2004-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1107">CVE-2004-1107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1108">CVE-2004-1108</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 14:02:06 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T14:02:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 2 Nov 2004 17:41:31 +0000">
+ <metadata tag="submitter" timestamp="2004-11-02T17:41:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 11:16:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T11:16:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-14.xml b/glsa-200411-14.xml
index adb16531..4e06a01c 100644
--- a/glsa-200411-14.xml
+++ b/glsa-200411-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-14">
<title>Kaffeine, gxine: Remotely exploitable buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
headers.
</synopsis>
<product type="ebuild">kaffeine gxine</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69663</bug>
<bug>70055</bug>
<access>remote</access>
@@ -56,26 +55,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/kaffeine-0.4.3b-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/kaffeine-0.4.3b-r1"</code>
<p>
All gxine users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/gxine-0.3.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/gxine-0.3.3-r1"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/alerts/2004/Oct/1011936.html">SecurityTracker Advisory</uri>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655">gxine Bug Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1034">CVE-2004-1034</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655">gxine Bug Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1034">CVE-2004-1034</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 3 Nov 2004 13:13:11 +0000">
+ <metadata tag="requester" timestamp="2004-11-03T13:13:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 5 Nov 2004 01:34:00 +0000">
+ <metadata tag="submitter" timestamp="2004-11-05T01:34:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 19:19:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T19:19:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-15.xml b/glsa-200411-15.xml
index 3bcc5581..773294f0 100644
--- a/glsa-200411-15.xml
+++ b/glsa-200411-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-15">
<title>OpenSSL, Groff: Insecure tempfile handling</title>
<synopsis>
@@ -10,8 +9,8 @@
user running the utility.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>November 08, 2004</announced>
- <revised>August 23, 2006: 02</revised>
+ <announced>2004-11-08</announced>
+ <revised>2006-08-23: 02</revised>
<bug>68404</bug>
<bug>68407</bug>
<access>local</access>
@@ -69,7 +68,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7d-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7d-r2"</code>
<p>
Note: /etc/ssl/misc/der_chop is protected by Portage as a configuration
file. Don't forget to use etc-update and overwrite the old version with
@@ -77,13 +76,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969">CAN-2004-0969</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975">CAN-2004-0975</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969">CAN-2004-0969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975">CAN-2004-0975</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 7 Nov 2004 18:43:48 +0000">
+ <metadata tag="submitter" timestamp="2004-11-07T18:43:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 18:44:31 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T18:44:31Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-16.xml b/glsa-200411-16.xml
index c2ea2c53..183641be 100644
--- a/glsa-200411-16.xml
+++ b/glsa-200411-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-16">
<title>zip: Path name buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
very long path names. This could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">zip</product>
- <announced>November 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70227</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zip-2.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zip-2.3-r4"</code>
</resolution>
<references>
<uri link="http://www.hexview.com/docs/20041103-1.txt">HexView zip Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010">CVE-2004-1010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010">CVE-2004-1010</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 7 Nov 2004 18:59:20 +0000">
+ <metadata tag="requester" timestamp="2004-11-07T18:59:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 8 Nov 2004 15:14:42 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-08T15:14:42Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 20:46:08 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T20:46:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-17.xml b/glsa-200411-17.xml
index dc07d10c..7637eb6c 100644
--- a/glsa-200411-17.xml
+++ b/glsa-200411-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-17">
<title>mtink: Insecure tempfile handling</title>
<synopsis>
@@ -9,8 +8,8 @@
utility.
</synopsis>
<product type="ebuild">mtink</product>
- <announced>November 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70310</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/mtink-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/mtink-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1110">CVE-2004-1110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1110">CVE-2004-1110</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 8 Nov 2004 11:16:34 +0000">
+ <metadata tag="requester" timestamp="2004-11-08T11:16:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 8 Nov 2004 11:16:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-08T11:16:46Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 21:01:51 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T21:01:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-18.xml b/glsa-200411-18.xml
index 5912fea8..2d7ac3b8 100644
--- a/glsa-200411-18.xml
+++ b/glsa-200411-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-18">
<title>Apache 2.0: Denial of Service by memory consumption</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 10, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-11-10</announced>
+ <revised>2007-12-30: 02</revised>
<bug>70138</bug>
<access>remote</access>
<affected>
@@ -45,16 +44,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.52-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942">CAN-2004-0942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942">CAN-2004-0942</uri>
<uri link="http://www.apacheweek.com/features/security-20">Security vulnerabilities in Apache httpd 2.0</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 09:58:15 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T09:58:15Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 9 Nov 2004 20:43:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-09T20:43:00Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-19.xml b/glsa-200411-19.xml
index be8937f0..62f87808 100644
--- a/glsa-200411-19.xml
+++ b/glsa-200411-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-19">
<title>Pavuk: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to run arbitrary code.
</synopsis>
<product type="ebuild">pavuk</product>
- <announced>November 10, 2004</announced>
- <revised>November 10, 2004: 01</revised>
+ <announced>2004-11-10</announced>
+ <revised>2004-11-10: 01</revised>
<bug>70516</bug>
<access>remote</access>
<affected>
@@ -44,20 +43,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-misc/pavuk-0.9.31"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/pavuk-0.9.31"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200407-19.xml">GLSA-200407-19</uri>
- <uri link="http://secunia.com/advisories/13120/">SA13120</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0456">CAN-2004-0456</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200407-19.xml">GLSA-200407-19</uri>
+ <uri link="https://secunia.com/advisories/13120/">SA13120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0456">CAN-2004-0456</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Nov 2004 07:00:44 +0000">
+ <metadata tag="requester" timestamp="2004-11-10T07:00:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Nov 2004 15:50:02 +0000">
+ <metadata tag="submitter" timestamp="2004-11-10T15:50:02Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Nov 2004 15:51:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-10T15:51:22Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-20.xml b/glsa-200411-20.xml
index 12c87cb9..dee1d743 100644
--- a/glsa-200411-20.xml
+++ b/glsa-200411-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-20">
<title>ez-ipupdate: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">ez-ipupdate</product>
- <announced>November 11, 2004</announced>
- <revised>November 11, 2004: 01</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-11: 01</revised>
<bug>69658</bug>
<access>remote</access>
<affected>
@@ -44,16 +43,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/ez-ipupdate-3.0.11_beta8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980">CAN-2004-0980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980">CAN-2004-0980</uri>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-November/028590.html">Full Disclosure Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 9 Nov 2004 20:12:06 +0000">
+ <metadata tag="submitter" timestamp="2004-11-09T20:12:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Nov 2004 14:43:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-11T14:43:17Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-21.xml b/glsa-200411-21.xml
index b5edec57..275719dc 100644
--- a/glsa-200411-21.xml
+++ b/glsa-200411-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-21">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
cycles (CAN-2004-0930).
</synopsis>
<product type="ebuild">samba</product>
- <announced>November 11, 2004</announced>
- <revised>November 15, 2004: 02</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-15: 02</revised>
<bug>70429</bug>
<access>remote</access>
<affected>
@@ -54,21 +53,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.8"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.8"</code>
</resolution>
<references>
- <uri link="http://www.samba.org/samba/security/CAN-2004-0930.html">Samba Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930">CAN-2004-0930</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882">CAN-2004-0882</uri>
+ <uri link="https://www.samba.org/samba/security/CAN-2004-0930.html">Samba Security Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930">CAN-2004-0930</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882">CAN-2004-0882</uri>
<uri link="http://security.e-matters.de/advisories/132004.html">E-Matters Advisory 13/2004</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Nov 2004 10:26:07 +0000">
+ <metadata tag="requester" timestamp="2004-11-10T10:26:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Nov 2004 20:53:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-10T20:53:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Nov 2004 10:18:49 +0000">
+ <metadata tag="submitter" timestamp="2004-11-11T10:18:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200411-22.xml b/glsa-200411-22.xml
index 87bd3a95..c3072fd0 100644
--- a/glsa-200411-22.xml
+++ b/glsa-200411-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-22">
<title>Davfs2, lvm-user: Insecure tempfile handling</title>
<synopsis>
@@ -9,8 +8,8 @@
to overwrite arbitrary files with the rights of the user running them.
</synopsis>
<product type="ebuild">davfs2</product>
- <announced>November 11, 2004</announced>
- <revised>November 11, 2004: 01</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-11: 01</revised>
<bug>68406</bug>
<bug>69149</bug>
<access>local</access>
@@ -60,21 +59,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/davfs2-0.2.2-r1"</code>
<p>
All lvm-user users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/lvm-user-1.0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0972">CAN-2004-0972</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0972">CAN-2004-0972</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 10 Nov 2004 09:15:59 +0000">
+ <metadata tag="submitter" timestamp="2004-11-10T09:15:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Nov 2004 20:29:52 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-11T20:29:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-23.xml b/glsa-200411-23.xml
index 82d13bc6..3ee3ec1f 100644
--- a/glsa-200411-23.xml
+++ b/glsa-200411-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-23">
<title>Ruby: Denial of Service issue</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">Ruby</product>
- <announced>November 16, 2004</announced>
- <revised>November 16, 2004: 01</revised>
+ <announced>2004-11-16</announced>
+ <revised>2004-11-16: 01</revised>
<bug>69985</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.6.8-r12"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.6.8-r12"</code>
<p>
All Ruby 1.8.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2_pre3"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.2_pre3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983">CAN-2004-0983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983">CAN-2004-0983</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Nov 2004 10:02:12 +0000">
+ <metadata tag="requester" timestamp="2004-11-15T10:02:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Nov 2004 10:02:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-15T10:02:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Nov 2004 20:10:34 +0000">
+ <metadata tag="submitter" timestamp="2004-11-15T20:10:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-24.xml b/glsa-200411-24.xml
index 6c2972c6..d2f04e29 100644
--- a/glsa-200411-24.xml
+++ b/glsa-200411-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-24">
<title>BNC: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and execution of arbitrary code.
</synopsis>
<product type="ebuild">BNC</product>
- <announced>November 16, 2004</announced>
- <revised>November 16, 2004: 01</revised>
+ <announced>2004-11-16</announced>
+ <revised>2004-11-16: 01</revised>
<bug>70674</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-irc/bnc-2.9.1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/bnc-2.9.1"</code>
</resolution>
<references>
<uri link="http://gotbnc.com/changes.html">BNC ChangeLog</uri>
<uri link="http://security.lss.hr/en/index.php?page=details&amp;ID=LSS-2004-11-03">LSS-2004-11-03</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Nov 2004 20:17:39 +0000">
+ <metadata tag="requester" timestamp="2004-11-11T20:17:39Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Nov 2004 21:49:41 +0000">
+ <metadata tag="submitter" timestamp="2004-11-11T21:49:41Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Nov 2004 23:44:26 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-12T23:44:26Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-25.xml b/glsa-200411-25.xml
index a6d2346c..0fdb3ddf 100644
--- a/glsa-200411-25.xml
+++ b/glsa-200411-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-25">
<title>SquirrelMail: Encoded text XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise of webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>November 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70739</bug>
<access>remote</access>
<affected>
@@ -49,23 +48,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.3a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.3a-r2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://article.gmane.org/gmane.mail.squirrelmail.user/21169">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1036">CVE-2004-1036</uri>
+ <uri link="https://article.gmane.org/gmane.mail.squirrelmail.user/21169">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1036">CVE-2004-1036</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Nov 2004 07:50:02 +0000">
+ <metadata tag="requester" timestamp="2004-11-13T07:50:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2004 18:02:58 +0000">
+ <metadata tag="submitter" timestamp="2004-11-14T18:02:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Nov 2004 18:40:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-14T18:40:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-26.xml b/glsa-200411-26.xml
index 09c652ae..2aa32952 100644
--- a/glsa-200411-26.xml
+++ b/glsa-200411-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-26">
<title>GIMPS, SETI@home, ChessBrain: Insecure installation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges by init scripts.
</synopsis>
<product type="ebuild">GIMPS,SETI@home,ChessBrain</product>
- <announced>November 17, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>69868</bug>
<access>local</access>
<affected>
@@ -57,32 +56,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/gimps-23.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/gimps-23.9-r1"</code>
<p>
All SETI@home users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/setiathome-3.03-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/setiathome-3.03-r2"</code>
<p>
All ChessBrain users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/chessbrain-20407-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/chessbrain-20407-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1115">CVE-2004-1115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1116">CVE-2004-1116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1117">CVE-2004-1117</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1115">CVE-2004-1115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1116">CVE-2004-1116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1117">CVE-2004-1117</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Nov 2004 08:00:15 +0000">
+ <metadata tag="requester" timestamp="2004-11-13T08:00:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2004 18:34:14 +0000">
+ <metadata tag="submitter" timestamp="2004-11-14T18:34:14Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Nov 2004 18:38:42 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-14T18:38:42Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-27.xml b/glsa-200411-27.xml
index 0f405638..2e1753f9 100644
--- a/glsa-200411-27.xml
+++ b/glsa-200411-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-27">
<title>Fcron: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">fcron</product>
- <announced>November 18, 2004</announced>
- <revised>November 18, 2004: 01</revised>
+ <announced>2004-11-18</announced>
+ <revised>2004-11-18: 01</revised>
<bug>71311</bug>
<access>local</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/fcron-2.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/fcron-2.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1030">CAN-2004-1030</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1031">CAN-2004-1031</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1032">CAN-2004-1032</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1033">CAN-2004-1033</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1030">CAN-2004-1030</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1031">CAN-2004-1031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1032">CAN-2004-1032</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1033">CAN-2004-1033</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Nov 2004 16:18:47 +0000">
+ <metadata tag="requester" timestamp="2004-11-16T16:18:47Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 Nov 2004 19:52:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-16T19:52:12Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Nov 2004 19:04:05 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-17T19:04:05Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-28.xml b/glsa-200411-28.xml
index c7a35b98..565b1a1b 100644
--- a/glsa-200411-28.xml
+++ b/glsa-200411-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-28">
<title>X.Org, XFree86: libXpm vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and arbitrary code execution.
</synopsis>
<product type="ebuild">X.Org, XFree86</product>
- <announced>November 19, 2004</announced>
- <revised>November 19, 2004: 01</revised>
+ <announced>2004-11-19</announced>
+ <revised>2004-11-19: 01</revised>
<bug>68544</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.7.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.7.0-r3"</code>
<p>
All XFree86 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xfree-x11-4.3.0-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xfree-x11-4.3.0-r8"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Nov 2004 20:14:27 +0000">
+ <metadata tag="requester" timestamp="2004-11-17T20:14:27Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Nov 2004 20:53:59 +0000">
+ <metadata tag="submitter" timestamp="2004-11-17T20:53:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Nov 2004 10:05:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-18T10:05:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-29.xml b/glsa-200411-29.xml
index f680f7c0..0d87c760 100644
--- a/glsa-200411-29.xml
+++ b/glsa-200411-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-29">
<title>unarj: Long filenames buffer overflow and a path traversal vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">unarj</product>
- <announced>November 19, 2004</announced>
- <revised>November 19, 2004: 01</revised>
+ <announced>2004-11-19</announced>
+ <revised>2004-11-19: 01</revised>
<bug>70966</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unarj-2.63a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unarj-2.63a-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947">CAN-2004-0947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027">CAN-2004-1027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947">CAN-2004-0947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027">CAN-2004-1027</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Nov 2004 16:42:36 +0000">
+ <metadata tag="requester" timestamp="2004-11-18T16:42:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Nov 2004 16:42:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-18T16:42:55Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Nov 2004 09:32:28 +0000">
+ <metadata tag="submitter" timestamp="2004-11-19T09:32:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-30.xml b/glsa-200411-30.xml
index 603e72d0..0d62636d 100644
--- a/glsa-200411-30.xml
+++ b/glsa-200411-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-30">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>November 23, 2004</announced>
- <revised>November 23, 2004: 01</revised>
+ <announced>2004-11-23</announced>
+ <revised>2004-11-23: 01</revised>
<bug>69019</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 17:05:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T17:05:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Nov 2004 17:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-22T17:05:20Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-31.xml b/glsa-200411-31.xml
index 5878241f..4ea2f45a 100644
--- a/glsa-200411-31.xml
+++ b/glsa-200411-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-31">
<title>ProZilla: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
of the user running ProZilla.
</synopsis>
<product type="ebuild">ProZilla</product>
- <announced>November 23, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-23</announced>
+ <revised>2006-05-22: 03</revised>
<bug>70090</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1120">CVE-2004-1120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1120">CVE-2004-1120</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Nov 2004 17:28:48 +0000">
+ <metadata tag="requester" timestamp="2004-11-22T17:28:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Nov 2004 19:27:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-22T19:27:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 19:46:53 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T19:46:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200411-32.xml b/glsa-200411-32.xml
index 70b1aa89..399b55b4 100644
--- a/glsa-200411-32.xml
+++ b/glsa-200411-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-32">
<title>phpBB: Remote command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands with the rights of the web server user.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>November 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>71681</bug>
<access>remote</access>
<affected>
@@ -81,16 +80,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpbb-2.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpbb-2.0.11"</code>
</resolution>
<references>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?t=240513">phpBB.com Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1315">CVE-2004-1315</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?t=240513">phpBB.com Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1315">CVE-2004-1315</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 18 Nov 2004 17:31:41 +0000">
+ <metadata tag="submitter" timestamp="2004-11-18T17:31:41Z">
klieber
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 08:51:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T08:51:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-33.xml b/glsa-200411-33.xml
index e97fe626..b8e00248 100644
--- a/glsa-200411-33.xml
+++ b/glsa-200411-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-33">
<title>TWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
commands with the permissions of the user running TWiki.
</synopsis>
<product type="ebuild">www-apps/twiki</product>
- <announced>November 24, 2004</announced>
- <revised>September 08, 2006: 02</revised>
+ <announced>2004-11-24</announced>
+ <revised>2006-09-08: 02</revised>
<bug>71035</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/twiki-20040902&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/twiki-20040902"</code>
</resolution>
<references>
<uri link="http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch">TWiki Security Alert</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1037">CAN-2004-1037</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1037">CAN-2004-1037</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Nov 2004 17:14:35 +0000">
+ <metadata tag="requester" timestamp="2004-11-22T17:14:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 23:25:58 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T23:25:58Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 08:52:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T08:52:40Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200411-34.xml b/glsa-200411-34.xml
index b2513592..9f5dec05 100644
--- a/glsa-200411-34.xml
+++ b/glsa-200411-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-34">
<title>Cyrus IMAP Server: Multiple remote vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cyrus-imapd</product>
- <announced>November 25, 2004</announced>
- <revised>November 25, 2004: 01</revised>
+ <announced>2004-11-25</announced>
+ <revised>2004-11-25: 01</revised>
<bug>72194</bug>
<access>remote</access>
<affected>
@@ -50,23 +49,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.2.10"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1011">CAN-2004-1011</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1012">CAN-2004-1012</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1013">CAN-2004-1013</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1015">CAN-2004-1015</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1011">CAN-2004-1011</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1012">CAN-2004-1012</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1013">CAN-2004-1013</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1015">CAN-2004-1015</uri>
<uri link="http://security.e-matters.de/advisories/152004.html">e-matters Advisory</uri>
<uri link="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">Cyrus IMAP Server ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Nov 2004 18:38:38 +0000">
+ <metadata tag="requester" timestamp="2004-11-23T18:38:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Nov 2004 22:08:00 +0000">
+ <metadata tag="submitter" timestamp="2004-11-23T22:08:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 17:22:57 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T17:22:57Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-35.xml b/glsa-200411-35.xml
index 7eec8be1..92077c79 100644
--- a/glsa-200411-35.xml
+++ b/glsa-200411-35.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-35">
<title>phpWebSite: HTTP response splitting vulnerability</title>
<synopsis>
phpWebSite is vulnerable to possible HTTP response splitting attacks.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>November 26, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-26</announced>
+ <revised>2006-05-22: 03</revised>
<bug>71502</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.9.3_p4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.9.3_p4-r2"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/380894">BugTraq Posting</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=863">phpWebSite Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1516">CVE-2004-1516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1516">CVE-2004-1516</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Nov 2004 19:21:49 +0000">
+ <metadata tag="requester" timestamp="2004-11-24T19:21:49Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 Nov 2004 09:49:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-25T09:49:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 09:12:53 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T09:12:53Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200411-36.xml b/glsa-200411-36.xml
index 924495b9..dcefea84 100644
--- a/glsa-200411-36.xml
+++ b/glsa-200411-36.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-36">
<title>phpMyAdmin: Multiple XSS vulnerabilities</title>
<synopsis>
phpMyAdmin is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>November 27, 2004</announced>
- <revised>November 27, 2004: 01</revised>
+ <announced>2004-11-27</announced>
+ <revised>2004-11-27: 01</revised>
<bug>71819</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.0_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.0_p3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055">CAN-2004-1055</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">PMASA-2004-3</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055">CAN-2004-1055</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">PMASA-2004-3</uri>
<uri link="http://www.netvigilance.com/html/advisory0005.htm">netVigilance Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Nov 2004 09:03:21 +0000">
+ <metadata tag="requester" timestamp="2004-11-24T09:03:21Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 26 Nov 2004 10:27:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-26T10:27:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 19:21:36 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T19:21:36Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-37.xml b/glsa-200411-37.xml
index 5e7cfa91..bdba394a 100644
--- a/glsa-200411-37.xml
+++ b/glsa-200411-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-37">
<title>Open DC Hub: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
remote code execution.
</synopsis>
<product type="ebuild">opendchub</product>
- <announced>November 28, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72371</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/opendchub-0.7.14-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/opendchub-0.7.14-r2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1115.html">Full-Disclosure Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1127">CVE-2004-1127</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1127">CVE-2004-1127</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 Nov 2004 03:48:46 +0000">
+ <metadata tag="submitter" timestamp="2004-11-28T03:48:46Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 Nov 2004 03:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-28T03:49:07Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200411-38.xml b/glsa-200411-38.xml
index faa22f30..167c5e78 100644
--- a/glsa-200411-38.xml
+++ b/glsa-200411-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-38">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
perform unrestricted actions on the host system.
</synopsis>
<product type="ebuild">Java</product>
- <announced>November 29, 2004</announced>
- <revised>May 31, 2006: 02</revised>
+ <announced>2004-11-29</announced>
+ <revised>2006-05-31: 02</revised>
<bug>72172</bug>
<bug>72221</bug>
<access>remote</access>
@@ -65,41 +64,41 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.06&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.06"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.06&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.06"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.01"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.01"</code>
<p>
Note: You should unmerge all vulnerable versions to be fully protected.
</p>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=158&amp;type=vulnerabilities">iDEFENSE Security Advisory 11.22.04</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1029">CAN-2004-1029</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1029">CAN-2004-1029</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2004-01.txt">Blackdown Security Advisory 2004-01</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Nov 2004 09:46:01 +0000">
+ <metadata tag="requester" timestamp="2004-11-25T09:46:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 21:58:36 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T21:58:36Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Nov 2004 21:15:47 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-29T21:15:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-01.xml b/glsa-200412-01.xml
index 7c1f3214..a1e7e796 100644
--- a/glsa-200412-01.xml
+++ b/glsa-200412-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-01">
<title>rssh, scponly: Unrestricted command execution</title>
<synopsis>
@@ -9,8 +8,8 @@
the restricted shell.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>December 03, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-12-03</announced>
+ <revised>2006-05-22: 03</revised>
<bug>72815</bug>
<bug>72816</bug>
<access>remote</access>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.0"</code>
<p>
All rssh users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh/rssh-2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh/rssh-2.2.3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/383046/2004-11-30/2004-12-06/0">BugTraq Posting</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1161">CVE-2004-1161</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1162">CVE-2004-1162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1161">CVE-2004-1161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1162">CVE-2004-1162</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 1 Dec 2004 09:03:59 +0000">
+ <metadata tag="requester" timestamp="2004-12-01T09:03:59Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 2 Dec 2004 13:01:44 +0000">
+ <metadata tag="submitter" timestamp="2004-12-02T13:01:44Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 3 Dec 2004 13:57:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-03T13:57:43Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-02.xml b/glsa-200412-02.xml
index 180b8f23..563b7541 100644
--- a/glsa-200412-02.xml
+++ b/glsa-200412-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-02">
<title>PDFlib: Multiple overflows in the included TIFF library</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">PDFlib</product>
- <announced>December 05, 2004</announced>
- <revised>December 05, 2004: 01</revised>
+ <announced>2004-12-05</announced>
+ <revised>2004-12-05: 01</revised>
<bug>69043</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/pdflib-5.0.4_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/pdflib-5.0.4_p1"</code>
</resolution>
<references>
- <uri link="http://www.pdflib.com/products/pdflib/info/PDFlib-5.0.4p1-changes.txt">PDFlib ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
- <uri link="/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
+ <uri link="https://www.pdflib.com/products/pdflib/info/PDFlib-5.0.4p1-changes.txt">PDFlib ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 1 Dec 2004 14:14:01 +0000">
+ <metadata tag="submitter" timestamp="2004-12-01T14:14:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 5 Dec 2004 14:12:37 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-05T14:12:37Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-03.xml b/glsa-200412-03.xml
index cb198e01..2cc5af6f 100644
--- a/glsa-200412-03.xml
+++ b/glsa-200412-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-03">
<title>imlib: Buffer overflows in image decoding</title>
<synopsis>
@@ -8,8 +7,8 @@
routines, potentially allowing execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib</product>
- <announced>December 06, 2004</announced>
- <revised>December 06, 2004: 01</revised>
+ <announced>2004-12-06</announced>
+ <revised>2004-12-06: 01</revised>
<bug>72681</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib-1.9.14-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib-1.9.14-r3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 09:59:18 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T09:59:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 09:59:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T09:59:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-04.xml b/glsa-200412-04.xml
index b8ed2634..b15c90e9 100644
--- a/glsa-200412-04.xml
+++ b/glsa-200412-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-04">
<title>Perl: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">perl</product>
- <announced>December 07, 2004</announced>
- <revised>December 07, 2004: 01</revised>
+ <announced>2004-12-07</announced>
+ <revised>2004-12-07: 01</revised>
<bug>66360</bug>
<access>local</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-5.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-5.8.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976">CAN-2004-0976</uri>
- <uri link="http://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976">CAN-2004-0976</uri>
+ <uri link="https://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 5 Dec 2004 01:07:23 +0000">
+ <metadata tag="submitter" timestamp="2004-12-05T01:07:23Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 21:18:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T21:18:17Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-05.xml b/glsa-200412-05.xml
index de5fbd81..6c5e8786 100644
--- a/glsa-200412-05.xml
+++ b/glsa-200412-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-05">
<title>mirrorselect: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">mirrorselect</product>
- <announced>December 07, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-12-07</announced>
+ <revised>2006-05-22: 04</revised>
<bug>73545</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-portage/mirrorselect-0.89&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-portage/mirrorselect-0.89"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 21:43:32 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T21:43:32Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 21:51:32 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T21:51:32Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-06.xml b/glsa-200412-06.xml
index f482c8e3..5b94c6c6 100644
--- a/glsa-200412-06.xml
+++ b/glsa-200412-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-06">
<title>PHProjekt: setup.php vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
users without admin rights to change the configuration.
</synopsis>
<product type="ebuild">PHProjekt</product>
- <announced>December 10, 2004</announced>
- <revised>December 10, 2004: 01</revised>
+ <announced>2004-12-10</announced>
+ <revised>2004-12-10: 01</revised>
<bug>73021</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-4.2-r1"</code>
</resolution>
<references>
<uri link="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=189&amp;mode=thread&amp;order=0">PHProjekt Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Dec 2004 14:30:29 +0000">
+ <metadata tag="requester" timestamp="2004-12-09T14:30:29Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 9 Dec 2004 16:24:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-09T16:24:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Dec 2004 17:26:05 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-10T17:26:05Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200412-07.xml b/glsa-200412-07.xml
index d20e9a88..2fe14c18 100644
--- a/glsa-200412-07.xml
+++ b/glsa-200412-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-07">
<title>file: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>December 13, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72521</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.12"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/id?1012433">SecurityTracker Alert ID 1012433</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304">CVE-2004-1304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304">CVE-2004-1304</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Dec 2004 10:27:20 +0000">
+ <metadata tag="requester" timestamp="2004-12-11T10:27:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Dec 2004 10:27:27 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-11T10:27:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Dec 2004 20:24:04 +0000">
+ <metadata tag="submitter" timestamp="2004-12-12T20:24:04Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200412-08.xml b/glsa-200412-08.xml
index c8d6fbab..c97cb073 100644
--- a/glsa-200412-08.xml
+++ b/glsa-200412-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-08">
<title>nfs-utils: Multiple remote vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to a Denial of Service, or the execution of arbitrary code.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>December 14, 2004</announced>
- <revised>December 14, 2004: 01</revised>
+ <announced>2004-12-14</announced>
+ <revised>2004-12-14: 01</revised>
<bug>72113</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/nfs-utils-1.0.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/nfs-utils-1.0.6-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946">CAN-2004-0946</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1014">CAN-2004-1014</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946">CAN-2004-0946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1014">CAN-2004-1014</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 5 Dec 2004 18:33:51 +0000">
+ <metadata tag="requester" timestamp="2004-12-05T18:33:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 15:50:26 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T15:50:26Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Dec 2004 10:25:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-11T10:25:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-09.xml b/glsa-200412-09.xml
index ea8cb262..6a1abdb3 100644
--- a/glsa-200412-09.xml
+++ b/glsa-200412-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-09">
<title>ncpfs: Buffer overflow in ncplogin and ncpmap</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">ncpfs</product>
- <announced>December 15, 2004</announced>
- <revised>December 15, 2004: 01</revised>
+ <announced>2004-12-15</announced>
+ <revised>2004-12-15: 01</revised>
<bug>72820</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/ncpfs-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/ncpfs-2.2.5"</code>
</resolution>
<references>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-November/029563.html">Full Disclosure Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1079">CAN-2004-1079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1079">CAN-2004-1079</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Dec 2004 07:35:34 +0000">
+ <metadata tag="requester" timestamp="2004-12-09T07:35:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Dec 2004 14:41:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-14T14:41:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Dec 2004 16:10:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-14T16:10:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-10.xml b/glsa-200412-10.xml
index b79551b8..49ffc220 100644
--- a/glsa-200412-10.xml
+++ b/glsa-200412-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-10">
<title>Vim, gVim: Vulnerable options in modelines</title>
<synopsis>
@@ -9,8 +8,8 @@
escalating privileges.
</synopsis>
<product type="ebuild">vim</product>
- <announced>December 15, 2004</announced>
- <revised>December 15, 2004: 01</revised>
+ <announced>2004-12-15</announced>
+ <revised>2004-12-15: 01</revised>
<bug>73715</bug>
<access>local</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/vim-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/vim-6.3-r2"</code>
<p>
All gVim users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gvim-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gvim-6.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138">CAN-2004-1138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138">CAN-2004-1138</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Dec 2004 22:32:12 +0000">
+ <metadata tag="requester" timestamp="2004-12-10T22:32:12Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 13 Dec 2004 17:03:31 +0000">
+ <metadata tag="submitter" timestamp="2004-12-13T17:03:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Dec 2004 14:00:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-15T14:00:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-11.xml b/glsa-200412-11.xml
index e825577e..0e26dc26 100644
--- a/glsa-200412-11.xml
+++ b/glsa-200412-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-11">
<title>Cscope: Insecure creation of temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>December 16, 2004</announced>
- <revised>December 16, 2004: 01</revised>
+ <announced>2004-12-16</announced>
+ <revised>2004-12-16: 01</revised>
<bug>71595</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996">CAN-2004-0996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996">CAN-2004-0996</uri>
<uri link="http://www.securityfocus.com/archive/1/381443">BugTraq Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Nov 2004 16:19:40 +0000">
+ <metadata tag="requester" timestamp="2004-11-29T16:19:40Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Nov 2004 17:43:04 +0000">
+ <metadata tag="submitter" timestamp="2004-11-29T17:43:04Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 20:27:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T20:27:56Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-12.xml b/glsa-200412-12.xml
index a9292af2..a4383d3f 100644
--- a/glsa-200412-12.xml
+++ b/glsa-200412-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-12">
<title>Adobe Acrobat Reader: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>December 16, 2004</announced>
- <revised>December 16, 2004: 01</revised>
+ <announced>2004-12-16</announced>
+ <revised>2004-12-16: 01</revised>
<bug>74406</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-5.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-5.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1152">CAN-2004-1152</uri>
- <uri link="http://www.adobe.com/support/techdocs/331153.html">Adobe Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1152">CAN-2004-1152</uri>
+ <uri link="https://www.adobe.com/support/techdocs/331153.html">Adobe Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Dec 2004 17:22:59 +0000">
+ <metadata tag="requester" timestamp="2004-12-15T17:22:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 15:18:04 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T15:18:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 17:02:05 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T17:02:05Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-13.xml b/glsa-200412-13.xml
index 8d4de3b9..ad038c1f 100644
--- a/glsa-200412-13.xml
+++ b/glsa-200412-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-13">
<title>Samba: Integer overflow</title>
<synopsis>
Samba contains a bug that could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>December 17, 2004</announced>
- <revised>December 17, 2004: 01</revised>
+ <announced>2004-12-17</announced>
+ <revised>2004-12-17: 01</revised>
<bug>73943</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154">CAN 2004-1154</uri>
- <uri link="http://www.samba.org/samba/security/CAN-2004-1154.html">Samba Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154">CAN 2004-1154</uri>
+ <uri link="https://www.samba.org/samba/security/CAN-2004-1154.html">Samba Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Dec 2004 20:27:23 +0000">
+ <metadata tag="submitter" timestamp="2004-12-15T20:27:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Dec 2004 19:53:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-17T19:53:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200412-14.xml b/glsa-200412-14.xml
index 9ac9b727..0e72e6b8 100644
--- a/glsa-200412-14.xml
+++ b/glsa-200412-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-14">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>December 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>74547</bug>
<access>remote</access>
<affected>
@@ -76,37 +75,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.3.10"</code>
<p>
All mod_php users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/mod_php-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/mod_php-4.3.10"</code>
<p>
All php-cgi users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-cgi-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-cgi-4.3.10"</code>
</resolution>
<references>
- <uri link="http://www.php.net/release_4_3_10.php">PHP 4.3.10 Release Announcement</uri>
- <uri link="http://www.hardened-php.net/advisories/012004.txt">Hardened-PHP Security Advisory</uri>
+ <uri link="https://www.php.net/release_4_3_10.php">PHP 4.3.10 Release Announcement</uri>
+ <uri link="https://www.hardened-php.net/advisories/012004.txt">Hardened-PHP Security Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/384663/2004-12-15/2004-12-21/0">SEC Consult Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019">CAN-2004-1019</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1020">CAN-2004-1020</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1063">CVE-2004-1063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1064">CVE-2004-1064</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065">CVE-2004-1065</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019">CAN-2004-1019</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1020">CAN-2004-1020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1063">CVE-2004-1063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1064">CVE-2004-1064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065">CVE-2004-1065</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Dec 2004 10:35:06 +0000">
+ <metadata tag="requester" timestamp="2004-12-16T10:35:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 11:09:01 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T11:09:01Z">
Koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Dec 2004 14:09:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-18T14:09:43Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-15.xml b/glsa-200412-15.xml
index 2d23d195..11ece103 100644
--- a/glsa-200412-15.xml
+++ b/glsa-200412-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-15">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
utilization.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>74443</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable version.
</p>
@@ -63,19 +62,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.8"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00016.html">Ethereal enpa-sa-00016</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139">CAN 2004-1139</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140">CAN 2004-1140</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141">CAN 2004-1141</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142">CAN 2004-1142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139">CAN 2004-1139</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140">CAN 2004-1140</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141">CAN 2004-1141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142">CAN 2004-1142</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Dec 2004 13:06:28 +0000">
+ <metadata tag="submitter" timestamp="2004-12-15T13:06:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:01:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:01:55Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-16.xml b/glsa-200412-16.xml
index 2757d8b7..f28d9e23 100644
--- a/glsa-200412-16.xml
+++ b/glsa-200412-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-16">
<title>kdelibs, kdebase: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
window injection.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>72804</bug>
<bug>73869</bug>
<access>remote and local</access>
@@ -68,24 +67,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.2.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.2.3-r4"</code>
<p>
All kdebase users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdebase-3.2.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdebase-3.2.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041209-1.txt">KDE Security Advisory: plain text password exposure</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1171">CAN 2004-1171</uri>
- <uri link="http://www.kde.org/info/security/advisory-20041213-1.txt">KDE Security Advisory: Konqueror Window Injection Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1158">CAN 2004-1158</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041209-1.txt">KDE Security Advisory: plain text password exposure</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1171">CAN 2004-1171</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041213-1.txt">KDE Security Advisory: Konqueror Window Injection Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1158">CAN 2004-1158</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 9 Dec 2004 20:24:54 +0000">
+ <metadata tag="submitter" timestamp="2004-12-09T20:24:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:04:36 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:04:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-17.xml b/glsa-200412-17.xml
index d1bd0585..271000e4 100644
--- a/glsa-200412-17.xml
+++ b/glsa-200412-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-17">
<title>kfax: Multiple overflows in the included TIFF library</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">kfax</product>
- <announced>December 19, 2004</announced>
- <revised>January 12, 2005: 04</revised>
+ <announced>2004-12-19</announced>
+ <revised>2005-01-12: 04</revised>
<bug>73795</bug>
<access>remote</access>
<affected>
@@ -62,19 +61,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.3.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.2"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041209-2.txt">KDE Security Advisory: kfax libtiff vulnerabilities</uri>
- <uri link="/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041209-2.txt">KDE Security Advisory: kfax libtiff vulnerabilities</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Dec 2004 09:35:12 +0000">
+ <metadata tag="submitter" timestamp="2004-12-10T09:35:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 16:51:18 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T16:51:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200412-18.xml b/glsa-200412-18.xml
index 08c8a70a..d608587e 100644
--- a/glsa-200412-18.xml
+++ b/glsa-200412-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-18">
<title>abcm2ps: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">abcm2ps</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 02</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 02</revised>
<bug>74702</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/abcm2ps-3.7.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/abcm2ps-3.7.21"</code>
</resolution>
<references>
<uri link="http://moinejf.free.fr/abcm2ps-3.txt">abcm2ps ChangeLog</uri>
- <uri link="http://secunia.com/advisories/13523/">Secunia Advisory</uri>
+ <uri link="https://secunia.com/advisories/13523/">Secunia Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Dec 2004 01:45:11 +0000">
+ <metadata tag="requester" timestamp="2004-12-19T01:45:11Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:05:57 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:05:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Dec 2004 16:00:19 +0000">
+ <metadata tag="submitter" timestamp="2004-12-19T16:00:19Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-19.xml b/glsa-200412-19.xml
index 43481dc8..3bc39018 100644
--- a/glsa-200412-19.xml
+++ b/glsa-200412-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-19">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure or command execution.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>74303</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1147">CAN-2004-1147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1148">CAN-2004-1148</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4">PHPMyAdmin advisory: PMASA-2004-4</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1147">CAN-2004-1147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1148">CAN-2004-1148</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4">PHPMyAdmin advisory: PMASA-2004-4</uri>
<uri link="http://www.exaprobe.com/labs/advisories/esa-2004-1213.html">Exaprobe.com advisory: esa-2004-1213</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 13:35:32 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T13:35:32Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Dec 2004 14:47:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-18T14:47:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-20.xml b/glsa-200412-20.xml
index 18f71993..4ea8c994 100644
--- a/glsa-200412-20.xml
+++ b/glsa-200412-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-20">
<title>NASM: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code through the use of a malicious object file.
</synopsis>
<product type="ebuild">NASM</product>
- <announced>December 20, 2004</announced>
- <revised>December 20, 2004: 01</revised>
+ <announced>2004-12-20</announced>
+ <revised>2004-12-20: 01</revised>
<bug>74477</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/nasm-0.98.38-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/nasm-0.98.38-r1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=6166881&amp;forum_id=4978">Original Advisory</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=6166881&amp;forum_id=4978">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Dec 2004 22:07:20 +0000">
+ <metadata tag="requester" timestamp="2004-12-16T22:07:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 22:07:54 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T22:07:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Dec 2004 11:34:13 +0000">
+ <metadata tag="submitter" timestamp="2004-12-17T11:34:13Z">
SeJo
</metadata>
</glsa>
diff --git a/glsa-200412-21.xml b/glsa-200412-21.xml
index 98d92da4..058eeb44 100644
--- a/glsa-200412-21.xml
+++ b/glsa-200412-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-21">
<title>MPlayer: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in remote executing of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>December 20, 2004</announced>
- <revised>December 20, 2004: 01</revised>
+ <announced>2004-12-20</announced>
+ <revised>2004-12-20: 01</revised>
<bug>74473</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre5-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre5-r5"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=168&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
@@ -60,13 +59,13 @@
<uri link="http://www.idefense.com/application/poi/display?id=166&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/mplayer.txt">Ariel Berkman Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Dec 2004 14:28:01 +0000">
+ <metadata tag="requester" timestamp="2004-12-19T14:28:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 22:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T22:01:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Dec 2004 09:31:29 +0000">
+ <metadata tag="submitter" timestamp="2004-12-20T09:31:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-22.xml b/glsa-200412-22.xml
index 5e03ada4..db36087a 100644
--- a/glsa-200412-22.xml
+++ b/glsa-200412-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-22">
<title>mpg123: Playlist buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code through the use of a malicious playlist.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>December 21, 2004</announced>
- <revised>December 21, 2004: 01</revised>
+ <announced>2004-12-21</announced>
+ <revised>2004-12-21: 01</revised>
<bug>74692</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r8"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/mpg123.txt">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284">CAN-2004-1284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284">CAN-2004-1284</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Dec 2004 14:15:47 +0000">
+ <metadata tag="requester" timestamp="2004-12-20T14:15:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Dec 2004 21:20:26 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-20T21:20:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 09:35:46 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T09:35:46Z">
SeJo
</metadata>
</glsa>
diff --git a/glsa-200412-23.xml b/glsa-200412-23.xml
index 7b9107d0..51c1b80d 100644
--- a/glsa-200412-23.xml
+++ b/glsa-200412-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-23">
<title>Zwiki: XSS vulnerability</title>
<synopsis>
Zwiki is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">zwiki</product>
- <announced>December 21, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72315</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-zope/zwiki-0.36.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-zope/zwiki-0.36.2-r1"</code>
</resolution>
<references>
<uri link="http://zwiki.org/925ZwikiXSSVulnerability">Zwiki Bug Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1075">CVE-2004-1075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1075">CVE-2004-1075</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Dec 2004 16:09:23 +0000">
+ <metadata tag="requester" timestamp="2004-12-21T16:09:23Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Dec 2004 16:33:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-21T16:33:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 21:14:05 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T21:14:05Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200412-24.xml b/glsa-200412-24.xml
index 5ffa1f68..321d513e 100644
--- a/glsa-200412-24.xml
+++ b/glsa-200412-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-24">
<title>Xpdf, GPdf: New integer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to the same issues.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>December 28, 2004</announced>
- <revised>December 28, 2004: 01</revised>
+ <announced>2004-12-28</announced>
+ <revised>2004-12-28: 01</revised>
<bug>75191</bug>
<bug>75201</bug>
<access>remote</access>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r7"</code>
<p>
All GPdf users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
<uri link="http://www.idefense.com/application/poi/display?id=172&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 28 Dec 2004 09:21:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-28T09:21:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 09:21:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T09:21:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-25.xml b/glsa-200412-25.xml
index 54f58a7c..72f1dca9 100644
--- a/glsa-200412-25.xml
+++ b/glsa-200412-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-25">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attacks to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>December 28, 2004</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2004-12-28</announced>
+ <revised>2005-01-12: 02</revised>
<bug>74479</bug>
<bug>75197</bug>
<bug>77023</bug>
@@ -59,24 +58,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1267">CAN-2004-1267</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1268">CAN-2004-1268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1269">CAN-2004-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1270">CAN-2004-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1267">CAN-2004-1267</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1268">CAN-2004-1268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1269">CAN-2004-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1270">CAN-2004-1270</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/cups.txt">Ariel Berkman Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/cups2.txt">Bartlomiej Sieka Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Dec 2004 17:52:31 +0000">
+ <metadata tag="requester" timestamp="2004-12-27T17:52:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 28 Dec 2004 09:42:46 +0000">
+ <metadata tag="submitter" timestamp="2004-12-28T09:42:46Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 12:52:03 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T12:52:03Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-26.xml b/glsa-200412-26.xml
index 99052ec2..9c093f08 100644
--- a/glsa-200412-26.xml
+++ b/glsa-200412-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-26">
<title>ViewCVS: Information leak and XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) issues.
</synopsis>
<product type="ebuild">ViewCVS</product>
- <announced>December 28, 2004</announced>
- <revised>December 28, 2004: 01</revised>
+ <announced>2004-12-28</announced>
+ <revised>2004-12-28: 01</revised>
<bug>72461</bug>
<bug>73772</bug>
<access>remote</access>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/viewcvs-0.9.2_p20041207-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/viewcvs-0.9.2_p20041207-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0915">CAN-2004-0915</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1062">CAN-2004-1062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0915">CAN-2004-0915</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1062">CAN-2004-1062</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 15:31:38 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T15:31:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 14:23:36 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T14:23:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200412-27.xml b/glsa-200412-27.xml
index 486973e7..7bdf45a6 100644
--- a/glsa-200412-27.xml
+++ b/glsa-200412-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-27">
<title>PHProjekt: Remote code execution vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP code.
</synopsis>
<product type="ebuild">PHProjekt</product>
- <announced>December 30, 2004</announced>
- <revised>December 30, 2004: 01</revised>
+ <announced>2004-12-30</announced>
+ <revised>2004-12-30: 01</revised>
<bug>75858</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-4.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-4.2-r2"</code>
</resolution>
<references>
<uri link="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=193&amp;mode=thread&amp;order=0">PHProjekt Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 29 Dec 2004 16:45:27 +0000">
+ <metadata tag="submitter" timestamp="2004-12-29T16:45:27Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Dec 2004 16:45:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-29T16:45:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-01.xml b/glsa-200501-01.xml
index e0cffee1..15bf3182 100644
--- a/glsa-200501-01.xml
+++ b/glsa-200501-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-01">
<title>LinPopUp: Buffer overflow in message reply</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Linpopup</product>
- <announced>January 04, 2005</announced>
- <revised>January 04, 2005: 01</revised>
+ <announced>2005-01-04</announced>
+ <revised>2005-01-04: 01</revised>
<bug>74705</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/linpopup-2.0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/linpopup-2.0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1282">CAN-2004-1282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1282">CAN-2004-1282</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/linpopup.txt">Stephen Dranger Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Dec 2004 10:20:27 +0000">
+ <metadata tag="requester" timestamp="2004-12-31T10:20:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 1 Jan 2005 22:08:20 +0000">
+ <metadata tag="submitter" timestamp="2005-01-01T22:08:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 1 Jan 2005 22:15:30 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-01T22:15:30Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-02.xml b/glsa-200501-02.xml
index 29b3fff6..d0eb3af3 100644
--- a/glsa-200501-02.xml
+++ b/glsa-200501-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-02">
<title>a2ps: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
arbitrary command execution.
</synopsis>
<product type="ebuild">a2ps</product>
- <announced>January 04, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-01-04</announced>
+ <revised>2006-05-22: 03</revised>
<bug>75784</bug>
<bug>61500</bug>
<access>local and remote</access>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/a2ps-4.13c-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/a2ps-4.13c-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/13641/">Secunia SA13641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170">CAN-2004-1170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1377">CVE-2004-1377</uri>
+ <uri link="https://secunia.com/advisories/13641/">Secunia SA13641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170">CAN-2004-1170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1377">CVE-2004-1377</uri>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-August/025678.html">Full-Disclosure Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 4 Jan 2005 09:44:14 +0000">
+ <metadata tag="requester" timestamp="2005-01-04T09:44:14Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 09:44:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T09:44:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 11:06:21 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T11:06:21Z">
SeJo
</metadata>
</glsa>
diff --git a/glsa-200501-03.xml b/glsa-200501-03.xml
index e5c4124b..eb2f959e 100644
--- a/glsa-200501-03.xml
+++ b/glsa-200501-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-03">
<title>Mozilla, Firefox, Thunderbird: Various vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
anti-spoofing issues.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>January 05, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-01-05</announced>
+ <revised>2007-12-30: 03</revised>
<bug>76112</bug>
<bug>68976</bug>
<bug>70749</bug>
@@ -83,49 +82,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.5"</code>
<p>
All Mozilla binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.5"</code>
<p>
All Firefox users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0"</code>
<p>
All Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0"</code>
<p>
All Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-0.9"</code>
<p>
All Thunderbird binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-0.9"</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0020-mozilla.txt">isec.pl Advisory</uri>
<uri link="http://broadcast.ptraced.net/advisories/008-firefox.thunderbird.txt">Martin (from ptraced.net) Advisory</uri>
- <uri link="http://secunia.com/advisories/13144/">Secunia Advisory SA13144</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2227">CVE-2004-2227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2228">CVE-2004-2228</uri>
+ <uri link="https://secunia.com/advisories/13144/">Secunia Advisory SA13144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2227">CVE-2004-2227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2228">CVE-2004-2228</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 10:09:38 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T10:09:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 10:10:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T10:10:52Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-04.xml b/glsa-200501-04.xml
index 588604f6..beb2b5d2 100644
--- a/glsa-200501-04.xml
+++ b/glsa-200501-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-04">
<title>Shoutcast Server: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Shoutcast-server-bin</product>
- <announced>January 05, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-05</announced>
+ <revised>2006-05-22: 02</revised>
<bug>75482</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/shoutcast-server-bin-1.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/shoutcast-server-bin-1.9.5"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/385350">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373">CVE-2004-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373">CVE-2004-1373</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Dec 2004 14:31:08 +0000">
+ <metadata tag="requester" timestamp="2004-12-29T14:31:08Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 19:23:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T19:23:19Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 20:51:10 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T20:51:10Z">
chriswhite
</metadata>
</glsa>
diff --git a/glsa-200501-05.xml b/glsa-200501-05.xml
index 0bc9bce0..61794c01 100644
--- a/glsa-200501-05.xml
+++ b/glsa-200501-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-05">
<title>mit-krb5: Heap overflow in libkadm5srv</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow that could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 05, 2005</announced>
- <revised>January 05, 2005: 01</revised>
+ <announced>2005-01-05</announced>
+ <revised>2005-01-05: 01</revised>
<bug>75143</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189">CAN 2004-1189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189">CAN 2004-1189</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Dec 2004 15:16:36 +0000">
+ <metadata tag="requester" timestamp="2004-12-30T15:16:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Dec 2004 19:47:37 +0000">
+ <metadata tag="submitter" timestamp="2004-12-30T19:47:37Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 5 Jan 2005 19:34:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-05T19:34:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-06.xml b/glsa-200501-06.xml
index a783c67c..85522655 100644
--- a/glsa-200501-06.xml
+++ b/glsa-200501-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-06">
<title>tiff: New overflows in image decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>January 05, 2005</announced>
- <revised>January 05, 2005: 01</revised>
+ <announced>2005-01-05</announced>
+ <revised>2005-01-05: 01</revised>
<bug>75213</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.7.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.7.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1183">CAN-2004-1183</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308">CAN-2004-1308</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1183">CAN-2004-1183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308">CAN-2004-1308</uri>
<uri link="http://www.idefense.com/application/poi/display?id=174&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 3 Jan 2005 10:21:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-03T10:21:55Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 14:07:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T14:07:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-07.xml b/glsa-200501-07.xml
index 3c2d07ad..077074c5 100644
--- a/glsa-200501-07.xml
+++ b/glsa-200501-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-07">
<title>xine-lib: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74475</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
# emerge --ask --oneshot --verbose media-libs/xine-lib</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187">CAN-2004-1187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188">CAN-2004-1188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300">CAN-2004-1300</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187">CAN-2004-1187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188">CAN-2004-1188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300">CAN-2004-1300</uri>
<uri link="http://www.idefense.com/application/poi/display?id=176&amp;type=vulnerabilities">iDefense Advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=177&amp;type=vulnerabilities">iDefense Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt">Ariel Berkman Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Dec 2004 14:06:44 +0000">
+ <metadata tag="requester" timestamp="2004-12-21T14:06:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 16:57:50 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T16:57:50Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 08:50:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T08:50:09Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-08.xml b/glsa-200501-08.xml
index 6b79d2f8..4ccdbe15 100644
--- a/glsa-200501-08.xml
+++ b/glsa-200501-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-08">
<title>phpGroupWare: Various vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to information disclosure or remote compromise.
</synopsis>
<product type="ebuild">phpgroupware</product>
- <announced>January 06, 2005</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2005-01-06</announced>
+ <revised>2006-05-22: 04</revised>
<bug>74487</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpgroupware-0.9.16.004&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpgroupware-0.9.16.004"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -57,17 +56,17 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/384492">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1383">CVE-2004-1383</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1384">CVE-2004-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1385">CVE-2004-1385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1383">CVE-2004-1383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1384">CVE-2004-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1385">CVE-2004-1385</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 6 Jan 2005 08:52:11 +0000">
+ <metadata tag="requester" timestamp="2005-01-06T08:52:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 08:52:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T08:52:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 13:44:43 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T13:44:43Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-09.xml b/glsa-200501-09.xml
index f0a8d8e0..325edc77 100644
--- a/glsa-200501-09.xml
+++ b/glsa-200501-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-09">
<title>xzgv: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xzgv</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74069</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xzgv-0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xzgv-0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994">CAN-2004-0994</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994">CAN-2004-0994</uri>
<uri link="http://www.idefense.com/application/poi/display?id=160&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 12:54:06 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T12:54:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 12:55:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T12:55:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-10.xml b/glsa-200501-10.xml
index 20a1823a..ca72a46f 100644
--- a/glsa-200501-10.xml
+++ b/glsa-200501-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-10">
<title>Vilistextum: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code through the use of a malicious webpage.
</synopsis>
<product type="ebuild">vilistextum</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74694</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/vilistextum-2.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/vilistextum-2.6.7"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/vilistextum.txt">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1299">CAN-2004-1299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1299">CAN-2004-1299</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 3 Jan 2005 15:34:01 +0000">
+ <metadata tag="requester" timestamp="2005-01-03T15:34:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 11:50:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T11:50:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 13:22:37 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T13:22:37Z">
SeJo
</metadata>
</glsa>
diff --git a/glsa-200501-11.xml b/glsa-200501-11.xml
index 23b864e2..c16f5230 100644
--- a/glsa-200501-11.xml
+++ b/glsa-200501-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-11">
<title>Dillo: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Dillo</product>
- <announced>January 09, 2005</announced>
- <revised>January 09, 2005: 01</revised>
+ <announced>2005-01-09</announced>
+ <revised>2005-01-09: 01</revised>
<bug>76665</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/dillo-0.8.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/dillo-0.8.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012">CAN-2005-0012</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012">CAN-2005-0012</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 15:41:51 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T15:41:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 9 Jan 2005 17:56:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-09T17:56:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 18:39:04 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T18:39:04Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-12.xml b/glsa-200501-12.xml
index f25d5faa..0fe8acee 100644
--- a/glsa-200501-12.xml
+++ b/glsa-200501-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-12">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 10, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-01-10</announced>
+ <revised>2006-05-22: 03</revised>
<bug>75568</bug>
<access>remote</access>
<affected>
@@ -46,7 +45,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.4.1"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -54,15 +53,15 @@
</resolution>
<references>
<uri link="http://tikiwiki.org/tiki-read_article.php?articleId=97">TikiWiki Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1386">CVE-2004-1386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1386">CVE-2004-1386</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 09:12:58 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T09:12:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 7 Jan 2005 09:13:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-07T09:13:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 7 Jan 2005 20:49:48 +0000">
+ <metadata tag="submitter" timestamp="2005-01-07T20:49:48Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200501-13.xml b/glsa-200501-13.xml
index b1ae8dc7..88759ffd 100644
--- a/glsa-200501-13.xml
+++ b/glsa-200501-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-13">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>75200</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200412-24</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200412-24</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 18:15:51 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T18:15:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 9 Jan 2005 18:17:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-09T18:17:10Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-14.xml b/glsa-200501-14.xml
index 52f2e0ae..0f048779 100644
--- a/glsa-200501-14.xml
+++ b/glsa-200501-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-14">
<title>mpg123: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
crafted MP2 or MP3 files.
</synopsis>
<product type="ebuild">media-sound/mpg123</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>76862</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991">CAN-2004-0991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991">CAN-2004-0991</uri>
<uri link="http://www.securityfocus.com/archive/1/374433">Bugtraq Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 13:23:00 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T13:23:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 8 Jan 2005 19:52:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-08T19:52:22Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:27:09 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:27:09Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200501-15.xml b/glsa-200501-15.xml
index 5082046f..c0246202 100644
--- a/glsa-200501-15.xml
+++ b/glsa-200501-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-15">
<title>UnRTF: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
way of a specially crafted RTF file.
</synopsis>
<product type="ebuild">app-text/unrtf</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>74480</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/unrtf-0.19.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/unrtf-0.19.3-r1"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/unrtf.txt">Original Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 8 Jan 2005 19:54:59 +0000">
+ <metadata tag="requester" timestamp="2005-01-08T19:54:59Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 8 Jan 2005 19:55:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-08T19:55:37Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:15:13 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:15:13Z">
dmargoli
</metadata>
</glsa>
diff --git a/glsa-200501-16.xml b/glsa-200501-16.xml
index 40691e9e..2e258891 100644
--- a/glsa-200501-16.xml
+++ b/glsa-200501-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-16">
<title>Konqueror: Java sandbox vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
actions on the host system.
</synopsis>
<product type="ebuild">Konqueror, kde, kdelibs</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>72750</bug>
<access>remote</access>
<affected>
@@ -54,13 +53,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041220-1.txt">KDE Security Advisory: Konqueror Java Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1145">CAN 2004-1145</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041220-1.txt">KDE Security Advisory: Konqueror Java Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1145">CAN 2004-1145</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 20:38:36 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T20:38:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:36:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:36:53Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200501-17.xml b/glsa-200501-17.xml
index 7fd89abb..b063ed26 100644
--- a/glsa-200501-17.xml
+++ b/glsa-200501-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-17">
<title>KPdf, KOffice: More vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
enticed to view a malicious PDF file.
</synopsis>
<product type="ebuild">kpdf, koffice</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>75203</bug>
<bug>75204</bug>
<access>remote</access>
@@ -65,15 +64,15 @@
# emerge --ask --oneshot --verbose app-office/koffice</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200412-24.xml">GLSA 200412-24</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://kde.org/info/security/advisory-20041223-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
- <uri link="http://koffice.kde.org/security/2004_xpdf_integer_overflow_2.php">KOffice XPDF Integer Overflow 2</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200412-24.xml">GLSA 200412-24</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://kde.org/info/security/advisory-20041223-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
+ <uri link="https://koffice.kde.org/security/2004_xpdf_integer_overflow_2.php">KOffice XPDF Integer Overflow 2</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 5 Jan 2005 17:17:02 +0000">
+ <metadata tag="submitter" timestamp="2005-01-05T17:17:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:37:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:37:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200501-18.xml b/glsa-200501-18.xml
index 61ad41d4..5c12a0a5 100644
--- a/glsa-200501-18.xml
+++ b/glsa-200501-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-18">
<title>KDE FTP KIOslave: Command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">konqueror</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>73759</bug>
<access>remote</access>
<affected>
@@ -55,13 +54,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20050101-1.txt">KDE Security Advisory: ftp kioslave command injection</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165">CAN-2004-1165</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050101-1.txt">KDE Security Advisory: ftp kioslave command injection</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165">CAN-2004-1165</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 5 Jan 2005 16:56:23 +0000">
+ <metadata tag="submitter" timestamp="2005-01-05T16:56:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:39:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:39:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200501-19.xml b/glsa-200501-19.xml
index 3beddb86..76f1525c 100644
--- a/glsa-200501-19.xml
+++ b/glsa-200501-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-19">
<title>imlib2: Buffer overflows in image decoding</title>
<synopsis>
@@ -8,8 +7,8 @@
routines, potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>77002</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 8 Jan 2005 09:59:17 +0000">
+ <metadata tag="requester" timestamp="2005-01-08T09:59:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:41:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:41:55Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Jan 2005 22:14:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-10T22:14:19Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-20.xml b/glsa-200501-20.xml
index d53b2ef2..6540e3bc 100644
--- a/glsa-200501-20.xml
+++ b/glsa-200501-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-20">
<title>o3read: Buffer overflow during file conversion</title>
<synopsis>
@@ -8,8 +7,8 @@
way of a specially crafted XML file.
</synopsis>
<product type="ebuild">o3read</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>74478</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/o3read-0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/o3read-0.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1288">CAN-2004-1288</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1288">CAN-2004-1288</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/o3read.txt">Wiktor Kopec advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 22:12:42 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T22:12:42Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Jan 2005 22:13:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-10T22:13:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Jan 2005 11:55:34 +0000">
+ <metadata tag="submitter" timestamp="2005-01-11T11:55:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-21.xml b/glsa-200501-21.xml
index 634a4245..53e906ce 100644
--- a/glsa-200501-21.xml
+++ b/glsa-200501-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-21">
<title>HylaFAX: hfaxd unauthorized login vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing remote users to bypass access control lists.
</synopsis>
<product type="ebuild">HylaFAX</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>75941</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hylafax-4.2.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hylafax-4.2.0-r2"</code>
<p>
Note: Due to heightened security, weak entries in the
hosts.hfaxd file may no longer work. Please see the HylaFAX
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1182">CAN-2004-1182</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1182">CAN-2004-1182</uri>
<uri link="http://marc.theaimsgroup.com/?l=hylafax&amp;m=110545119911558&amp;w=2">HylaFAX Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:56:02 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:56:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Jan 2005 13:48:18 +0000">
+ <metadata tag="submitter" timestamp="2005-01-10T13:48:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 16:16:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T16:16:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-22.xml b/glsa-200501-22.xml
index dd598b38..bf6bcb77 100644
--- a/glsa-200501-22.xml
+++ b/glsa-200501-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-22">
<title>poppassd_pam: Unauthorized password changing</title>
<synopsis>
@@ -8,8 +7,8 @@
authenticating the user first.
</synopsis>
<product type="ebuild">poppassd_pam</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>75820</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/poppassd_ceti-1.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/poppassd_ceti-1.8.4"</code>
<p>
Note: Portage will automatically replace the poppassd_pam
package by the poppassd_ceti package.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0002">CAN-2005-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0002">CAN-2005-0002</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Jan 2005 08:56:45 +0000">
+ <metadata tag="requester" timestamp="2005-01-11T08:56:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Jan 2005 12:12:22 +0000">
+ <metadata tag="submitter" timestamp="2005-01-11T12:12:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 19:52:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T19:52:14Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-23.xml b/glsa-200501-23.xml
index a049ddac..86e98471 100644
--- a/glsa-200501-23.xml
+++ b/glsa-200501-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-23">
<title>Exim: Two buffer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
the SPA authentication mechanism in Exim.
</synopsis>
<product type="ebuild">exim</product>
- <announced>January 12, 2005</announced>
- <revised>January 12, 2005: 01</revised>
+ <announced>2005-01-12</announced>
+ <revised>2005-01-12: 01</revised>
<bug>76893</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/exim-4.43-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/exim-4.43-r2"</code>
</resolution>
<references>
- <uri link="http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html">Exim Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0021">CAN-2005-0021</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0022">CAN-2005-0022</uri>
+ <uri link="https://www.exim.org/mail-archives/exim-announce/2005/msg00000.html">Exim Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0021">CAN-2005-0021</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0022">CAN-2005-0022</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:24:16 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:24:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Jan 2005 10:01:20 +0000">
+ <metadata tag="submitter" timestamp="2005-01-10T10:01:20Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Jan 2005 21:52:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-12T21:52:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-24.xml b/glsa-200501-24.xml
index d6ae2e0b..29f23e26 100644
--- a/glsa-200501-24.xml
+++ b/glsa-200501-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-24">
<title>tnftp: Arbitrary file overwriting</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to arbitrary file overwriting.
</synopsis>
<product type="ebuild">tnftp</product>
- <announced>January 14, 2005</announced>
- <revised>January 14, 2005: 01</revised>
+ <announced>2005-01-14</announced>
+ <revised>2005-01-14: 01</revised>
<bug>74704</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/tnftp-20050103&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/tnftp-20050103"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1294">CAN-2004-1294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1294">CAN-2004-1294</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/tnftp.txt">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:24:54 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:24:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 21:44:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T21:44:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jan 2005 23:35:57 +0000">
+ <metadata tag="submitter" timestamp="2005-01-12T23:35:57Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-25.xml b/glsa-200501-25.xml
index 326f299b..f40a7014 100644
--- a/glsa-200501-25.xml
+++ b/glsa-200501-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-25">
<title>Squid: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
execution.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 16, 2005</announced>
- <revised>February 07, 2005: 03</revised>
+ <announced>2005-01-16</announced>
+ <revised>2005-02-07: 03</revised>
<bug>77934</bug>
<bug>77521</bug>
<access>remote</access>
@@ -61,21 +60,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.7-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/13825/">Secunia Advisory SA13825</uri>
- <uri link="http://secunia.com/advisories/13789/">Secunia Advisory SA13789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094">CAN-2005-0094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095">CAN-2005-0095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096">CAN-2005-0096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097">CAN-2005-0097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194">CAN-2005-0194</uri>
+ <uri link="https://secunia.com/advisories/13825/">Secunia Advisory SA13825</uri>
+ <uri link="https://secunia.com/advisories/13789/">Secunia Advisory SA13789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094">CAN-2005-0094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095">CAN-2005-0095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096">CAN-2005-0096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097">CAN-2005-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194">CAN-2005-0194</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Jan 2005 17:51:35 +0000">
+ <metadata tag="submitter" timestamp="2005-01-14T17:51:35Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Jan 2005 17:55:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-14T17:55:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200501-26.xml b/glsa-200501-26.xml
index 43deeb51..a593b2c7 100644
--- a/glsa-200501-26.xml
+++ b/glsa-200501-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-26">
<title>ImageMagick: PSD decoding heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Document (PSD) files, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>January 20, 2005</announced>
- <revised>January 20, 2005: 01</revised>
+ <announced>2005-01-20</announced>
+ <revised>2005-01-20: 01</revised>
<bug>77932</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.1.8.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.1.8.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
<uri link="http://www.idefense.com/application/poi/display?id=184&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 13:50:38 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T13:50:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 09:15:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T09:15:57Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-27.xml b/glsa-200501-27.xml
index 79a39641..a3283897 100644
--- a/glsa-200501-27.xml
+++ b/glsa-200501-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-27">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
utilization.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>January 20, 2005</announced>
- <revised>January 20, 2005: 01</revised>
+ <announced>2005-01-20</announced>
+ <revised>2005-01-20: 01</revised>
<bug>78559</bug>
<access>remote</access>
<affected>
@@ -56,7 +55,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable version.
</p>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006">CAN-2005-0006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007">CAN-2005-0007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008">CAN-2005-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009">CAN-2005-0009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010">CAN-2005-0010</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084">CAN-2005-0084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006">CAN-2005-0006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007">CAN-2005-0007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008">CAN-2005-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009">CAN-2005-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010">CAN-2005-0010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084">CAN-2005-0084</uri>
<uri link="http://www.ethereal.com/news/item_20050120_01.html">Ethereal Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 21:23:59 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T21:23:59Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 22:30:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T22:30:28Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-28.xml b/glsa-200501-28.xml
index a603e2d4..d8ac333f 100644
--- a/glsa-200501-28.xml
+++ b/glsa-200501-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-28">
<title>Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to the same issue.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>January 21, 2005</announced>
- <revised>January 21, 2005: 01</revised>
+ <announced>2005-01-21</announced>
+ <revised>2005-01-21: 01</revised>
<bug>77888</bug>
<bug>78128</bug>
<access>remote</access>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r8"</code>
<p>
All GPdf users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.8.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
<uri link="http://www.idefense.com/application/poi/display?id=186&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 13:34:11 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T13:34:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 20:37:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T20:37:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-29.xml b/glsa-200501-29.xml
index f256e775..b60980a7 100644
--- a/glsa-200501-29.xml
+++ b/glsa-200501-29.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-29">
<title>Mailman: Cross-site scripting vulnerability</title>
<synopsis>
Mailman is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>January 22, 2005</announced>
- <revised>January 22, 2005: 01</revised>
+ <announced>2005-01-22</announced>
+ <revised>2005-01-22: 01</revised>
<bug>77524</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1177">CAN-2004-1177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1177">CAN-2004-1177</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jan 2005 10:01:17 +0000">
+ <metadata tag="requester" timestamp="2005-01-19T10:01:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 09:22:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T09:22:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 16:36:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T16:36:40Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-30.xml b/glsa-200501-30.xml
index cbebbe4d..518f6220 100644
--- a/glsa-200501-30.xml
+++ b/glsa-200501-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-30">
<title>CUPS: Stack overflow in included Xpdf code</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>January 22, 2005</announced>
- <revised>January 22, 2005: 01</revised>
+ <announced>2005-01-22</announced>
+ <revised>2005-01-22: 01</revised>
<bug>78249</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 20:52:56 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T20:52:56Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 20:53:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T20:53:07Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-31.xml b/glsa-200501-31.xml
index ef8d273b..72a038d6 100644
--- a/glsa-200501-31.xml
+++ b/glsa-200501-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-31">
<title>teTeX, pTeX, CSTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to temporary file handling issues.
</synopsis>
<product type="ebuild">teTeX</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>75801</bug>
<access>remote and local</access>
<affected>
@@ -67,33 +66,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-2.0.2-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-2.0.2-r5"</code>
<p>
All CSTeX users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/cstetex-2.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/cstetex-2.0.2-r1"</code>
<p>
Finally, all pTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Jan 2005 10:36:38 +0000">
+ <metadata tag="requester" timestamp="2005-01-21T10:36:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 22:41:12 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T22:41:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jan 2005 12:09:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-23T12:09:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-32.xml b/glsa-200501-32.xml
index 06984050..c92495fb 100644
--- a/glsa-200501-32.xml
+++ b/glsa-200501-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-32">
<title>KPdf, KOffice: Stack overflow in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kpdf, koffice</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>78619</bug>
<bug>78620</bug>
<access>remote</access>
@@ -64,15 +63,15 @@
# emerge --ask --oneshot --verbose app-office/koffice</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-18</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050119-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050120-1.txt">KDE Security Advisory: KOffice PDF Import Filter Vulnerability</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-18</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050119-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050120-1.txt">KDE Security Advisory: KOffice PDF Import Filter Vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 09:23:04 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T09:23:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jan 2005 12:21:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-23T12:21:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-33.xml b/glsa-200501-33.xml
index 4cb3ac35..a56261ed 100644
--- a/glsa-200501-33.xml
+++ b/glsa-200501-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-33">
<title>MySQL: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>77805</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.22-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.22-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004">CAN-2005-0004</uri>
- <uri link="http://secunia.com/advisories/13867/">Secunia Advisory SA13867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004">CAN-2005-0004</uri>
+ <uri link="https://secunia.com/advisories/13867/">Secunia Advisory SA13867</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jan 2005 10:01:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-19T10:01:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 22:17:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T22:17:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 01:00:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T01:00:40Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-34.xml b/glsa-200501-34.xml
index 377bf955..e01c0506 100644
--- a/glsa-200501-34.xml
+++ b/glsa-200501-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-34">
<title>Konversation: Various vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
command execution or information leaks.
</synopsis>
<product type="ebuild">konversation</product>
- <announced>January 24, 2005</announced>
- <revised>January 24, 2005: 01</revised>
+ <announced>2005-01-24</announced>
+ <revised>2005-01-24: 01</revised>
<bug>78712</bug>
<access>remote</access>
<affected>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/konversation-0.15.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/konversation-0.15.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0129">CAN-2005-0129</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0130">CAN-2005-0130</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0131">CAN-2005-0131</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050121-1.txt">KDE Security Advisory: Multiple vulnerabilities in Konversation</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0129">CAN-2005-0129</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0130">CAN-2005-0130</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0131">CAN-2005-0131</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050121-1.txt">KDE Security Advisory: Multiple vulnerabilities in Konversation</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Jan 2005 19:25:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-21T19:25:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 21:24:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T21:24:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 00:39:45 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T00:39:45Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-35.xml b/glsa-200501-35.xml
index 83722a5e..a118b481 100644
--- a/glsa-200501-35.xml
+++ b/glsa-200501-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-35">
<title>Evolution: Integer overflow in camel-lock-helper</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>January 24, 2005</announced>
- <revised>January 24, 2005: 01</revised>
+ <announced>2005-01-24</announced>
+ <revised>2005-01-24: 01</revised>
<bug>79183</bug>
<access>local and remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102">CAN-2005-0102</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102">CAN-2005-0102</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 24 Jan 2005 14:31:03 +0000">
+ <metadata tag="submitter" timestamp="2005-01-24T14:31:03Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Jan 2005 21:37:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-24T21:37:19Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200501-36.xml b/glsa-200501-36.xml
index 1d0c50f3..6e1556c8 100644
--- a/glsa-200501-36.xml
+++ b/glsa-200501-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-36">
<title>AWStats: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or to the leak of information.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>January 25, 2005</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2005-01-25</announced>
+ <revised>2009-05-28: 04</revised>
<bug>77963</bug>
<bug>81775</bug>
<access>remote</access>
@@ -52,26 +51,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.3-r2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://awstats.sourceforge.net/docs/awstats_changelog.txt">AWStats ChangeLog</uri>
+ <uri link="https://awstats.sourceforge.net/docs/awstats_changelog.txt">AWStats ChangeLog</uri>
<uri link="http://www.idefense.com/application/poi/display?id=185">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0116">CAN-2005-0116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0362">CAN-2005-0362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0363">CAN-2005-0363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0116">CAN-2005-0116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0362">CAN-2005-0362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0363">CAN-2005-0363</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Jan 2005 13:51:20 +0000">
+ <metadata tag="requester" timestamp="2005-01-18T13:51:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 01:15:21 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T01:15:21Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Jan 2005 18:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-25T18:48:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200501-37.xml b/glsa-200501-37.xml
index fc0ac731..7525ba2e 100644
--- a/glsa-200501-37.xml
+++ b/glsa-200501-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-37">
<title>GraphicsMagick: PSD decoding heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Document (PSD) files, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">GraphicsMagick</product>
- <announced>January 26, 2005</announced>
- <revised>January 26, 2005: 01</revised>
+ <announced>2005-01-26</announced>
+ <revised>2005-01-26: 01</revised>
<bug>79336</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
- <uri link="/security/en/glsa/glsa-200501-26.xml">GLSA 200501-26</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-26.xml">GLSA 200501-26</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Jan 2005 12:20:54 +0000">
+ <metadata tag="submitter" timestamp="2005-01-26T12:20:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Jan 2005 12:21:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-26T12:21:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-38.xml b/glsa-200501-38.xml
index d941af80..3a0ab17f 100644
--- a/glsa-200501-38.xml
+++ b/glsa-200501-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-38">
<title>Perl: rmtree and DBI tmpfile vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>January 26, 2005</announced>
- <revised>March 15, 2005: 03</revised>
+ <announced>2005-01-26</announced>
+ <revised>2005-03-15: 03</revised>
<bug>75696</bug>
<bug>78634</bug>
<bug>79685</bug>
@@ -71,14 +70,14 @@
# emerge --ask --oneshot --verbose dev-perl/DBI</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452">CAN-2004-0452</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077">CAN-2005-0077</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448">CAN-2005-0448</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452">CAN-2004-0452</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077">CAN-2005-0077</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448">CAN-2005-0448</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Jan 2005 15:06:53 +0000">
+ <metadata tag="submitter" timestamp="2005-01-26T15:06:53Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Jan 2005 20:14:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-26T20:14:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-39.xml b/glsa-200501-39.xml
index 4f0c700a..3f8a2328 100644
--- a/glsa-200501-39.xml
+++ b/glsa-200501-39.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-39">
<title>SquirrelMail: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution and compromise webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>January 28, 2005</announced>
- <revised>January 28, 2005: 01</revised>
+ <announced>2005-01-28</announced>
+ <revised>2005-01-28: 01</revised>
<bug>78116</bug>
<access>remote</access>
<affected>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.4"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/message.php?msg_id=10628451">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075">CAN-2005-0075</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103">CAN-2005-0103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104">CAN-2005-0104</uri>
+ <uri link="https://sourceforge.net/mailarchive/message.php?msg_id=10628451">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075">CAN-2005-0075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103">CAN-2005-0103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104">CAN-2005-0104</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Jan 2005 17:32:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-25T17:32:40Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Jan 2005 10:51:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-28T10:51:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-40.xml b/glsa-200501-40.xml
index 9e607088..4096f35c 100644
--- a/glsa-200501-40.xml
+++ b/glsa-200501-40.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-40">
<title>ngIRCd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
daemon and possibly execute arbitrary code.
</synopsis>
<product type="ebuild">ngIRCd</product>
- <announced>January 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79705</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ngIRCd-0.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ngIRCd-0.8.2"</code>
</resolution>
<references>
<uri link="http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html">ngIRCd Release Annoucement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0199">CVE-2005-0199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0199">CVE-2005-0199</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Jan 2005 15:18:35 +0000">
+ <metadata tag="requester" timestamp="2005-01-27T15:18:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Jan 2005 16:04:52 +0000">
+ <metadata tag="submitter" timestamp="2005-01-27T16:04:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Jan 2005 16:45:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-27T16:45:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-41.xml b/glsa-200501-41.xml
index bb6acb9d..fbc61910 100644
--- a/glsa-200501-41.xml
+++ b/glsa-200501-41.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-41">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78944</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5"</code>
</resolution>
<references>
<uri link="http://tikiwiki.org/art102">TikiWiki Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0200">CVE-2005-0200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0200">CVE-2005-0200</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 28 Jan 2005 00:00:37 +0000">
+ <metadata tag="submitter" timestamp="2005-01-28T00:00:37Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 17:00:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T17:00:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200501-42.xml b/glsa-200501-42.xml
index 2e20cf95..a1b2b5e9 100644
--- a/glsa-200501-42.xml
+++ b/glsa-200501-42.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-42">
<title>VDR: Arbitrary file overwriting issue</title>
<synopsis>
@@ -8,8 +7,8 @@
the overwriting of arbitrary files.
</synopsis>
<product type="ebuild">VDR</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>78230</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vdr-1.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vdr-1.2.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0071">CAN-2005-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0071">CAN-2005-0071</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jan 2005 10:22:04 +0000">
+ <metadata tag="requester" timestamp="2005-01-29T10:22:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 10:59:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T10:59:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 11:54:01 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T11:54:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-43.xml b/glsa-200501-43.xml
index 29f5ae2c..448554ee 100644
--- a/glsa-200501-43.xml
+++ b/glsa-200501-43.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-43">
<title>f2c: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">f2c</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>79725</bug>
<access>local</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/f2c-20030320-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/f2c-20030320-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 12:00:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T12:00:55Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 16:13:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T16:13:04Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200501-44.xml b/glsa-200501-44.xml
index ef393b11..c45290f4 100644
--- a/glsa-200501-44.xml
+++ b/glsa-200501-44.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-44">
<title>ncpfs: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">ncpfs</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>77414</bug>
<access>remote and local</access>
<affected>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/ncpfs-2.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/ncpfs-2.2.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0013">CAN-2005-0013</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0014">CAN-2005-0014</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0013">CAN-2005-0013</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0014">CAN-2005-0014</uri>
<uri link="ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6">ncpfs ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jan 2005 09:02:48 +0000">
+ <metadata tag="requester" timestamp="2005-01-29T09:02:48Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 11:01:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T11:01:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 11:18:51 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T11:18:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-45.xml b/glsa-200501-45.xml
index 39f31e05..b272511a 100644
--- a/glsa-200501-45.xml
+++ b/glsa-200501-45.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-45">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
Gallery is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>January 30, 2005</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2005-01-30</announced>
+ <revised>2006-05-22: 04</revised>
<bug>78522</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.4.4_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.4.4_p6"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -57,13 +56,13 @@
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=149">Gallery Announcement</uri>
- <uri link="http://secunia.com/advisories/13887/">Secunia Advisory SA13887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0220">CVE-2005-0220</uri>
+ <uri link="https://secunia.com/advisories/13887/">Secunia Advisory SA13887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0220">CVE-2005-0220</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 13:17:09 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T13:17:09Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Jan 2005 18:58:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-30T18:58:59Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200501-46.xml b/glsa-200501-46.xml
index e0994428..1cf14781 100644
--- a/glsa-200501-46.xml
+++ b/glsa-200501-46.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-46">
<title>ClamAV: Multiple issues</title>
<synopsis>
@@ -8,8 +7,8 @@
and evasion of virus scanning.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>January 31, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78656</bug>
<bug>79194</bug>
<access>remote</access>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.81&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.81"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0133">CAN-2005-0133</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0218">CVE-2005-0218</uri>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=440649">ClamAV Release Announcement</uri>
- <uri link="http://secunia.com/advisories/13900/">Secunia SA13900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0133">CAN-2005-0133</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0218">CVE-2005-0218</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=440649">ClamAV Release Announcement</uri>
+ <uri link="https://secunia.com/advisories/13900/">Secunia SA13900</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Jan 2005 15:17:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-27T15:17:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Jan 2005 21:31:06 +0000">
+ <metadata tag="submitter" timestamp="2005-01-27T21:31:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Jan 2005 09:07:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-31T09:07:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-01.xml b/glsa-200502-01.xml
index dc4c970f..1173a8d2 100644
--- a/glsa-200502-01.xml
+++ b/glsa-200502-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-01">
<title>FireHOL: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">FireHOL</product>
- <announced>February 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79330</bug>
<access>local</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/firehol-1.224&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/firehol-1.224"</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/firehol/firehol/firehol.sh">FireHOL CVS log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0225">CVE-2005-0225</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/firehol/firehol/firehol.sh">FireHOL CVS log</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0225">CVE-2005-0225</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jan 2005 10:32:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-28T10:32:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 16:54:50 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T16:54:50Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Jan 2005 23:48:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-31T23:48:34Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200502-02.xml b/glsa-200502-02.xml
index f0adcaeb..253ff0d2 100644
--- a/glsa-200502-02.xml
+++ b/glsa-200502-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-02">
<title>UW IMAP: CRAM-MD5 authentication bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
authentication allowing authentication bypass.
</synopsis>
<product type="ebuild">uw-imap</product>
- <announced>February 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79874</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2004b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2004b"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/702777">US-CERT VU#702777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198">CVE-2005-0198</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/702777">US-CERT VU#702777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198">CVE-2005-0198</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Jan 2005 15:19:50 +0000">
+ <metadata tag="requester" timestamp="2005-01-31T15:19:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Jan 2005 21:25:45 +0000">
+ <metadata tag="submitter" timestamp="2005-01-31T21:25:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Feb 2005 20:33:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-01T20:33:12Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200502-03.xml b/glsa-200502-03.xml
index b1528150..819d9b3e 100644
--- a/glsa-200502-03.xml
+++ b/glsa-200502-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-03">
<title>enscript: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">enscript</product>
- <announced>February 02, 2005</announced>
- <revised>February 02, 2005: 01</revised>
+ <announced>2005-02-02</announced>
+ <revised>2005-02-02: 01</revised>
<bug>77408</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/enscript-1.6.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/enscript-1.6.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1184">CAN-2004-1184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1185">CAN-2004-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1186">CAN-2004-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1184">CAN-2004-1184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1185">CAN-2004-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1186">CAN-2004-1186</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jan 2005 10:31:54 +0000">
+ <metadata tag="requester" timestamp="2005-01-28T10:31:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 1 Feb 2005 17:01:52 +0000">
+ <metadata tag="submitter" timestamp="2005-02-01T17:01:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Feb 2005 21:40:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-01T21:40:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-04.xml b/glsa-200502-04.xml
index bcdf616b..43961f83 100644
--- a/glsa-200502-04.xml
+++ b/glsa-200502-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-04">
<title>Squid: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
log poisoning.
</synopsis>
<product type="ebuild">squid</product>
- <announced>February 02, 2005</announced>
- <revised>February 02, 2005: 02</revised>
+ <announced>2005-02-02</announced>
+ <revised>2005-02-02: 02</revised>
<bug>79495</bug>
<bug>78776</bug>
<bug>80201</bug>
@@ -68,18 +67,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.7-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.7-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173">CAN-2005-0173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211">CAN-2005-0211</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173">CAN-2005-0173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211">CAN-2005-0211</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 30 Jan 2005 20:28:30 +0000">
+ <metadata tag="submitter" timestamp="2005-01-30T20:28:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Feb 2005 12:30:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-02T12:30:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200502-05.xml b/glsa-200502-05.xml
index 980864b9..d64923b1 100644
--- a/glsa-200502-05.xml
+++ b/glsa-200502-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-05">
<title>Newspost: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially execute arbitrary code.
</synopsis>
<product type="ebuild">newspost</product>
- <announced>February 03, 2005</announced>
- <revised>February 21, 2005: 02</revised>
+ <announced>2005-02-03</announced>
+ <revised>2005-02-21: 02</revised>
<bug>78530</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/newspost-2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/newspost-2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0101">CAN-2005-0101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0101">CAN-2005-0101</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 15:47:51 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T15:47:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Feb 2005 17:29:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-02T17:29:13Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200502-06.xml b/glsa-200502-06.xml
index b03beab3..85af5068 100644
--- a/glsa-200502-06.xml
+++ b/glsa-200502-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-06">
<title>LessTif: Multiple vulnerabilities in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">lesstif</product>
- <announced>February 06, 2005</announced>
- <revised>February 06, 2005: 01</revised>
+ <announced>2005-02-06</announced>
+ <revised>2005-02-06: 01</revised>
<bug>78483</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/lesstif-0.94.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/lesstif-0.94.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
<uri link="http://www.lesstif.org/ReleaseNotes.html">LessTif Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 16:13:30 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T16:13:30Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:18:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:18:21Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-07.xml b/glsa-200502-07.xml
index e182e7a7..faa1b365 100644
--- a/glsa-200502-07.xml
+++ b/glsa-200502-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-07">
<title>OpenMotif: Multiple vulnerabilities in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in OpenMotif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>February 07, 2005</announced>
- <revised>February 25, 2005: 03</revised>
+ <announced>2005-02-07</announced>
+ <revised>2005-02-25: 03</revised>
<bug>78111</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
- <uri link="/security/en/glsa/glsa-200411-28.xml">GLSA 200411-28</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200411-28.xml">GLSA 200411-28</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Feb 2005 18:02:43 +0000">
+ <metadata tag="requester" timestamp="2005-02-02T18:02:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 19:11:27 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T19:11:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:15:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:15:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-08.xml b/glsa-200502-08.xml
index 64d6fd8a..6d756972 100644
--- a/glsa-200502-08.xml
+++ b/glsa-200502-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-08">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code, Denial of Service and security bypass.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>February 07, 2005</announced>
- <revised>June 26, 2007: 06</revised>
+ <announced>2005-02-07</announced>
+ <revised>2007-06-26: 06</revised>
<bug>80342</bug>
<access>remote and local</access>
<affected>
@@ -64,19 +63,19 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php">PostgreSQL Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0227">CAN-2005-0227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0244">CAN-2005-0244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0245">CAN-2005-0245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0246">CAN-2005-0246</uri>
+ <uri link="https://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php">PostgreSQL Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0227">CAN-2005-0227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0244">CAN-2005-0244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0245">CAN-2005-0245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0246">CAN-2005-0246</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Feb 2005 18:15:02 +0000">
+ <metadata tag="requester" timestamp="2005-02-02T18:15:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 18:50:22 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T18:50:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:27:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:27:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-09.xml b/glsa-200502-09.xml
index 445b64ea..be774ed2 100644
--- a/glsa-200502-09.xml
+++ b/glsa-200502-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-09">
<title>Python: Arbitrary code execution through SimpleXMLRPCServer</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Python</product>
- <announced>February 08, 2005</announced>
- <revised>February 08, 2005: 01</revised>
+ <announced>2005-02-08</announced>
+ <revised>2005-02-08: 01</revised>
<bug>80592</bug>
<access>remote</access>
<affected>
@@ -57,16 +56,16 @@
# emerge --ask --oneshot --verbose dev-lang/python</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0089">CAN-2005-0089</uri>
- <uri link="http://www.python.org/security/PSF-2005-001/">Python PSF-2005-001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0089">CAN-2005-0089</uri>
+ <uri link="https://www.python.org/security/PSF-2005-001/">Python PSF-2005-001</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 4 Feb 2005 14:45:11 +0000">
+ <metadata tag="requester" timestamp="2005-02-04T14:45:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 7 Feb 2005 08:31:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-07T08:31:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 8 Feb 2005 19:35:29 +0000">
+ <metadata tag="submitter" timestamp="2005-02-08T19:35:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-10.xml b/glsa-200502-10.xml
index a91da565..678d0790 100644
--- a/glsa-200502-10.xml
+++ b/glsa-200502-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-10">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>February 09, 2005</announced>
- <revised>February 09, 2005: 01</revised>
+ <announced>2005-02-09</announced>
+ <revised>2005-02-09: 01</revised>
<bug>78629</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 5 Feb 2005 20:35:14 +0000">
+ <metadata tag="submitter" timestamp="2005-02-05T20:35:14Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 9 Feb 2005 15:54:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-09T15:54:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200502-11.xml b/glsa-200502-11.xml
index 87c17e8f..61309e1f 100644
--- a/glsa-200502-11.xml
+++ b/glsa-200502-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-11">
<title>Mailman: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>February 10, 2005</announced>
- <revised>February 10, 2005: 01</revised>
+ <announced>2005-02-10</announced>
+ <revised>2005-02-10: 01</revised>
<bug>81109</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.5-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.5-r4"</code>
</resolution>
<references>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2005-February/031562.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202">CAN-2005-0202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202">CAN-2005-0202</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 9 Feb 2005 21:12:44 +0000">
+ <metadata tag="requester" timestamp="2005-02-09T21:12:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 9 Feb 2005 21:59:02 +0000">
+ <metadata tag="submitter" timestamp="2005-02-09T21:59:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Feb 2005 16:41:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-10T16:41:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200502-12.xml b/glsa-200502-12.xml
index 176b21e3..a3096a42 100644
--- a/glsa-200502-12.xml
+++ b/glsa-200502-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-12">
<title>Webmin: Information leak in Gentoo binary package</title>
<synopsis>
@@ -8,8 +7,8 @@
the local encrypted root password.
</synopsis>
<product type="ebuild">Webmin</product>
- <announced>February 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>77731</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.170-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.170-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0427">CVE-2005-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0427">CVE-2005-0427</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 10 Feb 2005 15:50:39 +0000">
+ <metadata tag="submitter" timestamp="2005-02-10T15:50:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Feb 2005 15:50:49 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-10T15:50:49Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-13.xml b/glsa-200502-13.xml
index 9887db4e..b9279574 100644
--- a/glsa-200502-13.xml
+++ b/glsa-200502-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-13">
<title>Perl: Vulnerabilities in perl-suid wrapper</title>
<synopsis>
@@ -8,8 +7,8 @@
elevated privileges have been discovered in the perl-suid wrapper.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>February 11, 2005</announced>
- <revised>February 11, 2005: 01</revised>
+ <announced>2005-02-11</announced>
+ <revised>2005-02-11: 01</revised>
<bug>80460</bug>
<access>local</access>
<affected>
@@ -60,16 +59,16 @@
# emerge --ask --oneshot --verbose dev-lang/perl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155">CAN-2005-0155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156">CAN-2005-0156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155">CAN-2005-0155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156">CAN-2005-0156</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 4 Feb 2005 14:45:58 +0000">
+ <metadata tag="requester" timestamp="2005-02-04T14:45:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 15:34:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T15:34:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 16:11:49 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T16:11:49Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-14.xml b/glsa-200502-14.xml
index 355f10b8..9d3d7338 100644
--- a/glsa-200502-14.xml
+++ b/glsa-200502-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-14">
<title>mod_python: Publisher Handler vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to information disclosure.
</synopsis>
<product type="ebuild">mod_python</product>
- <announced>February 13, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-02-13</announced>
+ <revised>2007-12-30: 03</revised>
<bug>80109</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
# emerge --ask --oneshot --verbose www-apache/mod_python</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0088">CAN-2005-0088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0088">CAN-2005-0088</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 20:01:25 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T20:01:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 20:10:55 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T20:10:55Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 20:41:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T20:41:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200502-15.xml b/glsa-200502-15.xml
index 6e372781..65df58bc 100644
--- a/glsa-200502-15.xml
+++ b/glsa-200502-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-15">
<title>PowerDNS: Denial of Service vulnerability</title>
<synopsis>
A vulnerability in PowerDNS could lead to a temporary Denial of Service.
</synopsis>
<product type="ebuild">PowerDNS</product>
- <announced>February 13, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>80713</bug>
<access>remote</access>
<affected>
@@ -46,17 +45,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-2.9.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-2.9.17"</code>
</resolution>
<references>
- <uri link="http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17">PowerDNS Release Notes</uri>
+ <uri link="https://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17">PowerDNS Release Notes</uri>
<uri link="http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21">PowerDNS Ticket #21</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428">CVE-2005-0428</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428">CVE-2005-0428</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 17:12:23 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T17:12:23Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Feb 2005 17:14:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-13T17:14:58Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200502-16.xml b/glsa-200502-16.xml
index 2f9347fb..df725f50 100644
--- a/glsa-200502-16.xml
+++ b/glsa-200502-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-16">
<title>ht://Dig: Cross-site scripting vulnerability</title>
<synopsis>
ht://Dig is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">htdig</product>
- <announced>February 13, 2005</announced>
- <revised>February 13, 2005: 01</revised>
+ <announced>2005-02-13</announced>
+ <revised>2005-02-13: 01</revised>
<bug>80602</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/htdig-3.1.6-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/htdig-3.1.6-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0085">CAN-2005-0085</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0085">CAN-2005-0085</uri>
<uri link="http://securitytracker.com/alerts/2005/Feb/1013078.html">SecurityTracker #1013078</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Feb 2005 17:17:57 +0000">
+ <metadata tag="requester" timestamp="2005-02-13T17:17:57Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Feb 2005 17:19:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-13T17:19:04Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 20:15:40 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T20:15:40Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200502-17.xml b/glsa-200502-17.xml
index 3cfecd37..c891bc1f 100644
--- a/glsa-200502-17.xml
+++ b/glsa-200502-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-17">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure and facilitate execution of arbitrary code.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>February 14, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-02-14</announced>
+ <revised>2007-12-30: 03</revised>
<bug>73871</bug>
<bug>74076</bug>
<bug>74321</bug>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-7.54-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-7.54-r3"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/linux/changelogs/754u1/">Opera Changelog for 7.54u1</uri>
- <uri link="http://www.opera.com/linux/changelogs/754u2/">Opera Changelog for 7.54u2</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1157">CVE-2004-1157</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1489">CVE-2004-1489</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1490">CVE-2004-1490</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1491">CVE-2004-1491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0456">CVE-2005-0456</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0457">CVE-2005-0457</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754u1/">Opera Changelog for 7.54u1</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754u2/">Opera Changelog for 7.54u2</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1157">CVE-2004-1157</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1489">CVE-2004-1489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1490">CVE-2004-1490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1491">CVE-2004-1491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0456">CVE-2005-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0457">CVE-2005-0457</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 10 Feb 2005 15:51:32 +0000">
+ <metadata tag="submitter" timestamp="2005-02-10T15:51:32Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 11:21:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T11:21:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-18.xml b/glsa-200502-18.xml
index d0dedb3f..fcc334eb 100644
--- a/glsa-200502-18.xml
+++ b/glsa-200502-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-18">
<title>VMware Workstation: Untrusted library search path</title>
<synopsis>
@@ -8,8 +7,8 @@
directory, resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">VMware</product>
- <announced>February 14, 2005</announced>
- <revised>May 25, 2006: 03</revised>
+ <announced>2005-02-14</announced>
+ <revised>2006-05-25: 03</revised>
<bug>81344</bug>
<access>local</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-workstation-3.2.1.2242-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-workstation-3.2.1.2242-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0444">CVE-2005-0444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0444">CVE-2005-0444</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Feb 2005 12:53:09 +0000">
+ <metadata tag="requester" timestamp="2005-02-12T12:53:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Feb 2005 12:53:31 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-12T12:53:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 19:36:17 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T19:36:17Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200502-19.xml b/glsa-200502-19.xml
index 84a26a36..1b0d993f 100644
--- a/glsa-200502-19.xml
+++ b/glsa-200502-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-19">
<title>PostgreSQL: Buffer overflows in PL/PgSQL parser</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>February 14, 2005</announced>
- <revised>June 26, 2007: 04</revised>
+ <announced>2005-02-14</announced>
+ <revised>2007-06-26: 04</revised>
<bug>81350</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0247">CAN-2005-0247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0247">CAN-2005-0247</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 15:37:29 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T15:37:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 20:39:12 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T20:39:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:03:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:03:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-20.xml b/glsa-200502-20.xml
index c335bf1f..79e60556 100644
--- a/glsa-200502-20.xml
+++ b/glsa-200502-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-20">
<title>Emacs, XEmacs: Format string vulnerabilities in movemail</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Emacs</product>
- <announced>February 15, 2005</announced>
- <revised>July 23, 2006: 02</revised>
+ <announced>2005-02-15</announced>
+ <revised>2006-07-23: 02</revised>
<bug>79686</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-21.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-21.4"</code>
<p>
All XEmacs users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/xemacs-21.4.15-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/xemacs-21.4.15-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100">CAN-2005-0100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100">CAN-2005-0100</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 15:36:27 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T15:36:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 16:06:08 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T16:06:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Feb 2005 16:06:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-15T16:06:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-21.xml b/glsa-200502-21.xml
index 16a9a7bc..edebbf64 100644
--- a/glsa-200502-21.xml
+++ b/glsa-200502-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-21">
<title>lighttpd: Script source disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
should be executed as CGI or FastCGI applications.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>February 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81776</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.3.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.3.10-r1"</code>
</resolution>
<references>
- <uri link="http://article.gmane.org/gmane.comp.web.lighttpd/1171">lighttpd-announce Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0453">CVE-2005-0453</uri>
+ <uri link="https://article.gmane.org/gmane.comp.web.lighttpd/1171">lighttpd-announce Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0453">CVE-2005-0453</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 12:34:31 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T12:34:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:13:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:13:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Feb 2005 20:53:12 +0000">
+ <metadata tag="submitter" timestamp="2005-02-14T20:53:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-22.xml b/glsa-200502-22.xml
index 92a3529c..8c625df4 100644
--- a/glsa-200502-22.xml
+++ b/glsa-200502-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-22">
<title>wpa_supplicant: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">wpa_supplicant</product>
- <announced>February 16, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81993</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/wpa_supplicant-0.2.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/wpa_supplicant-0.2.7"</code>
</resolution>
<references>
<uri link="http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html">wpa_supplicant Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0470">CVE-2005-0470</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0470">CVE-2005-0470</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 18:34:56 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T18:34:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:11:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Feb 2005 21:06:18 +0000">
+ <metadata tag="submitter" timestamp="2005-02-14T21:06:18Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200502-23.xml b/glsa-200502-23.xml
index e6fb174a..b419e04b 100644
--- a/glsa-200502-23.xml
+++ b/glsa-200502-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-23">
<title>KStars: Buffer overflow in fliccd</title>
<synopsis>
@@ -8,8 +7,8 @@
execution with elevated privileges.
</synopsis>
<product type="ebuild">kstars</product>
- <announced>February 16, 2005</announced>
- <revised>February 16, 2005: 01</revised>
+ <announced>2005-02-16</announced>
+ <revised>2005-02-16: 01</revised>
<bug>79585</bug>
<access>remote and local</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdeedu-3.3.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdeedu-3.3.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0011">CAN-2005-0011</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0011">CAN-2005-0011</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 06:01:05 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T06:01:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 16 Feb 2005 20:27:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-16T20:27:57Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200502-24.xml b/glsa-200502-24.xml
index 95b79e56..9e8bd04e 100644
--- a/glsa-200502-24.xml
+++ b/glsa-200502-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-24">
<title>Midnight Commander: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and one buffer underflow leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">mc</product>
- <announced>February 17, 2005</announced>
- <revised>February 17, 2005: 01</revised>
+ <announced>2005-02-17</announced>
+ <revised>2005-02-17: 01</revised>
<bug>77992</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/mc-4.6.0-r13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/mc-4.6.0-r13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 20:35:43 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T20:35:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Feb 2005 16:08:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-15T16:08:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 20:09:31 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T20:09:31Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200502-25.xml b/glsa-200502-25.xml
index 9cdf5e07..9f814d11 100644
--- a/glsa-200502-25.xml
+++ b/glsa-200502-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-25">
<title>Squid: Denial of Service through DNS responses</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>February 18, 2005</announced>
- <revised>February 18, 2005: 01</revised>
+ <announced>2005-02-18</announced>
+ <revised>2005-02-18: 01</revised>
<bug>81997</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446">CAN-2005-0446</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446">CAN-2005-0446</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Feb 2005 20:33:19 +0000">
+ <metadata tag="requester" timestamp="2005-02-17T20:33:19Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 21:28:52 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T21:28:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:26:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-18T09:26:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-26.xml b/glsa-200502-26.xml
index 3e2513bf..93e76f0b 100644
--- a/glsa-200502-26.xml
+++ b/glsa-200502-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-26">
<title>GProFTPD: gprostats format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability, potentially leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">GProFTPD</product>
- <announced>February 18, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81894</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gproftpd-8.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gproftpd-8.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0484">CVE-2005-0484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0484">CVE-2005-0484</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Feb 2005 19:27:51 +0000">
+ <metadata tag="requester" timestamp="2005-02-16T19:27:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 00:01:48 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T00:01:48Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:37:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-18T09:37:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-27.xml b/glsa-200502-27.xml
index 11005966..15cb1ebd 100644
--- a/glsa-200502-27.xml
+++ b/glsa-200502-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-27">
<title>gFTP: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
creation or overwriting of arbitrary files.
</synopsis>
<product type="ebuild">gFTP</product>
- <announced>February 19, 2005</announced>
- <revised>February 19, 2005: 01</revised>
+ <announced>2005-02-19</announced>
+ <revised>2005-02-19: 01</revised>
<bug>81994</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gftp-2.0.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gftp-2.0.18-r1"</code>
</resolution>
<references>
<uri link="http://archives.seul.org/gftp/announce/Feb-2005/msg00000.html">gFTP Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0372">CAN-2005-0372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0372">CAN-2005-0372</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Feb 2005 19:28:38 +0000">
+ <metadata tag="requester" timestamp="2005-02-16T19:28:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 20:30:31 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T20:30:31Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 19 Feb 2005 10:43:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-19T10:43:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-28.xml b/glsa-200502-28.xml
index ad9f4be5..d515b7c6 100644
--- a/glsa-200502-28.xml
+++ b/glsa-200502-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-28">
<title>PuTTY: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
server to execute arbitrary code on unsuspecting PSCP and PSFTP clients.
</synopsis>
<product type="ebuild">Putty</product>
- <announced>February 21, 2005</announced>
- <revised>February 21, 2005: 01</revised>
+ <announced>2005-02-21</announced>
+ <revised>2005-02-21: 01</revised>
<bug>82753</bug>
<access>remote</access>
<affected>
@@ -50,21 +49,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/putty-0.57&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/putty-0.57"</code>
</resolution>
<references>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-readdir.html">PuTTY vulnerability vuln-sftp-readdir</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html">PuTTY vulnerability vuln-sftp-string</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0467">CAN-2005-0467</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-readdir.html">PuTTY vulnerability vuln-sftp-readdir</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html">PuTTY vulnerability vuln-sftp-string</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0467">CAN-2005-0467</uri>
<uri link="http://www.idefense.com/application/poi/display?id=201&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Feb 2005 09:51:17 +0000">
+ <metadata tag="requester" timestamp="2005-02-21T09:51:17Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Feb 2005 09:52:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-21T09:52:44Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Feb 2005 13:42:55 +0000">
+ <metadata tag="submitter" timestamp="2005-02-21T13:42:55Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200502-29.xml b/glsa-200502-29.xml
index fbb66001..4e479f38 100644
--- a/glsa-200502-29.xml
+++ b/glsa-200502-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-29">
<title>Cyrus IMAP Server: Multiple overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
could potentially lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cyrus-imapd</product>
- <announced>February 23, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>82404</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.2.12"</code>
</resolution>
<references>
<uri link="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&amp;msg=33723">Cyrus IMAP Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0546">CVE-2005-0546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0546">CVE-2005-0546</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Feb 2005 10:42:26 +0000">
+ <metadata tag="requester" timestamp="2005-02-18T10:42:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 19 Feb 2005 20:45:06 +0000">
+ <metadata tag="submitter" timestamp="2005-02-19T20:45:06Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Feb 2005 12:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-23T12:49:07Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200502-30.xml b/glsa-200502-30.xml
index 14f23213..b69638d9 100644
--- a/glsa-200502-30.xml
+++ b/glsa-200502-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-30">
<title>cmd5checkpw: Local password leak vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
cmd5checkpw passwords.
</synopsis>
<product type="ebuild">cmd5checkpw</product>
- <announced>February 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78256</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cmd5checkpw-0.22-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cmd5checkpw-0.22-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0580">CVE-2005-0580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0580">CVE-2005-0580</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Feb 2005 11:26:13 +0000">
+ <metadata tag="requester" timestamp="2005-02-24T11:26:13Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Feb 2005 09:22:33 +0000">
+ <metadata tag="submitter" timestamp="2005-02-25T09:22:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Feb 2005 09:25:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-25T09:25:07Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-31.xml b/glsa-200502-31.xml
index 878b71a3..36521e33 100644
--- a/glsa-200502-31.xml
+++ b/glsa-200502-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-31">
<title>uim: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation vulnerability.
</synopsis>
<product type="ebuild">uim</product>
- <announced>February 28, 2005</announced>
- <revised>February 28, 2005: 01</revised>
+ <announced>2005-02-28</announced>
+ <revised>2005-02-28: 01</revised>
<bug>82678</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-0.4.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/uim-0.4.5.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0503">CAN-2005-0503</uri>
- <uri link="http://lists.freedesktop.org/archives/uim/2005-February/000996.html">uim announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0503">CAN-2005-0503</uri>
+ <uri link="https://lists.freedesktop.org/archives/uim/2005-February/000996.html">uim announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 09:53:35 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T09:53:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 12:40:49 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T12:40:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Feb 2005 08:59:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-28T08:59:25Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200502-32.xml b/glsa-200502-32.xml
index 6224c72c..c7e698e6 100644
--- a/glsa-200502-32.xml
+++ b/glsa-200502-32.xml
@@ -6,8 +6,8 @@
traversal attacks.
</synopsis>
<product type="ebuild">unace</product>
- <announced>February 28, 2005</announced>
- <revised>May 19, 2014: 2</revised>
+ <announced>2005-02-28</announced>
+ <revised>2014-05-19: 2</revised>
<bug>81958</bug>
<access>remote</access>
<affected>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160">
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160">
CAN-2005-0160
</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161">
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161">
CAN-2005-0161
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 22:18:40 +0000">system</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 May 2014 00:38:42 +0000">system</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 May 2014 02:38:44 +0200">system</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T22:18:40Z">system</metadata>
+ <metadata tag="submitter" timestamp="2014-05-19T00:38:42Z">system</metadata>
+ <metadata tag="bugReady" timestamp="2014-05-19T00:38:44Z">system</metadata>
</glsa>
diff --git a/glsa-200502-33.xml b/glsa-200502-33.xml
index 045f2c12..6174e7ca 100644
--- a/glsa-200502-33.xml
+++ b/glsa-200502-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-33">
<title>MediaWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
security bypass attacks.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>February 28, 2005</announced>
- <revised>February 28, 2005: 01</revised>
+ <announced>2005-02-28</announced>
+ <revised>2005-02-28: 01</revised>
<bug>80729</bug>
<bug>82954</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.3.11"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/14125/">Secunia Advisory SA14125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0534">CAN-2005-0534</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0535">CAN-2005-0535</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0536">CAN-2005-0536</uri>
+ <uri link="https://secunia.com/advisories/14125/">Secunia Advisory SA14125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0534">CAN-2005-0534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0535">CAN-2005-0535</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0536">CAN-2005-0536</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Feb 2005 11:32:05 +0000">
+ <metadata tag="requester" timestamp="2005-02-24T11:32:05Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Feb 2005 09:25:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-25T09:25:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 16:48:17 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T16:48:17Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200503-01.xml b/glsa-200503-01.xml
index a992d810..fdc43a84 100644
--- a/glsa-200503-01.xml
+++ b/glsa-200503-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-01">
<title>Qt: Untrusted library search path</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>March 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>75181</bug>
<access>local</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0627">CVE-2005-0627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0627">CVE-2005-0627</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 06:13:07 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T06:13:07Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 12:59:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T12:59:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-02.xml b/glsa-200503-02.xml
index 3c399ba3..99b56675 100644
--- a/glsa-200503-02.xml
+++ b/glsa-200503-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-02">
<title>phpBB: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
rights or expose and manipulate sensitive data.
</synopsis>
<product type="ebuild">phpbb</product>
- <announced>March 01, 2005</announced>
- <revised>March 01, 2005: 01</revised>
+ <announced>2005-03-01</announced>
+ <revised>2005-03-01: 01</revised>
<bug>82955</bug>
<access>local and remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpBB-2.0.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpBB-2.0.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0258">CAN-2005-0258</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0259">CAN-2005-0259</uri>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=267563">phpBB announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0258">CAN-2005-0258</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0259">CAN-2005-0259</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=267563">phpBB announcement</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Feb 2005 14:35:23 +0000">
+ <metadata tag="requester" timestamp="2005-02-28T14:35:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Feb 2005 15:10:08 +0000">
+ <metadata tag="submitter" timestamp="2005-02-28T15:10:08Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 18:22:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T18:22:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-03.xml b/glsa-200503-03.xml
index 5fc31806..90a6f6e9 100644
--- a/glsa-200503-03.xml
+++ b/glsa-200503-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-03">
<title>Gaim: Multiple Denial of Service issues</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the application.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>March 01, 2005</announced>
- <revised>March 01, 2005: 01</revised>
+ <announced>2005-03-01</announced>
+ <revised>2005-03-01: 01</revised>
<bug>83253</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.1.4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0472">CAN-2005-0472</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0473">CAN-2005-0473</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0472">CAN-2005-0472</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0473">CAN-2005-0473</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 09:54:05 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T09:54:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Feb 2005 10:52:36 +0000">
+ <metadata tag="submitter" timestamp="2005-02-25T10:52:36Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 08:51:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T08:51:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-04.xml b/glsa-200503-04.xml
index 192c2c94..14307ba6 100644
--- a/glsa-200503-04.xml
+++ b/glsa-200503-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-04">
<title>phpWebSite: Arbitrary PHP execution and path disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
reveals the full path of scripts.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>March 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83297</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.0-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/14399/">Secunia Advisory SA14399</uri>
+ <uri link="https://secunia.com/advisories/14399/">Secunia Advisory SA14399</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_id=922&amp;ANN_user_op=view">phpWebSite announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0565">CVE-2005-0565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0572">CVE-2005-0572</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0565">CVE-2005-0565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0572">CVE-2005-0572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 21:23:09 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T21:23:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 12:09:41 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T12:09:41Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200503-05.xml b/glsa-200503-05.xml
index d3a5173e..0ef8beaf 100644
--- a/glsa-200503-05.xml
+++ b/glsa-200503-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-05">
<title>xli, xloadimage: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">xli</product>
- <announced>March 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79762</bug>
<access>remote</access>
<affected>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xli-1.17.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xli-1.17.0-r1"</code>
<p>
All xloadimage users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xloadimage-4.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xloadimage-4.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0775">CAN-2001-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638">CVE-2005-0638</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0639">CVE-2005-0639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0775">CAN-2001-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638">CVE-2005-0638</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0639">CVE-2005-0639</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Feb 2005 21:34:13 +0000">
+ <metadata tag="requester" timestamp="2005-02-28T21:34:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Feb 2005 22:05:32 +0000">
+ <metadata tag="submitter" timestamp="2005-02-28T22:05:32Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Mar 2005 16:53:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-02T16:53:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-06.xml b/glsa-200503-06.xml
index 9be93351..2a7bf1c0 100644
--- a/glsa-200503-06.xml
+++ b/glsa-200503-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-06">
<title>BidWatcher: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing arbitrary code execution.
</synopsis>
<product type="ebuild">bidwatcher</product>
- <announced>March 03, 2005</announced>
- <revised>March 03, 2005: 01</revised>
+ <announced>2005-03-03</announced>
+ <revised>2005-03-03: 01</revised>
<bug>82460</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/bidwatcher-1.13.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/bidwatcher-1.13.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158">CAN-2005-0158</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158">CAN-2005-0158</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 1 Mar 2005 08:44:34 +0000">
+ <metadata tag="requester" timestamp="2005-03-01T08:44:34Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 15:30:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T15:30:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 20:11:39 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T20:11:39Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200503-07.xml b/glsa-200503-07.xml
index b44ef698..203a9401 100644
--- a/glsa-200503-07.xml
+++ b/glsa-200503-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-07">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution, XSS issues and bypass of security restrictions.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>March 03, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-03</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83190</bug>
<bug>83792</bug>
<access>remote</access>
@@ -59,23 +58,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.1_p2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.1_p2-r1"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1">PMASA-2005-1</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-2">PMASA-2005-2</uri>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1113788&amp;group_id=23067&amp;atid=377408">phpMyAdmin bug 1113788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0543">CVE-2005-0543</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0544">CVE-2005-0544</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0653">CVE-2005-0653</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1">PMASA-2005-1</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-2">PMASA-2005-2</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=1113788&amp;group_id=23067&amp;atid=377408">phpMyAdmin bug 1113788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0543">CVE-2005-0543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0544">CVE-2005-0544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0653">CVE-2005-0653</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:38:30 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:38:30Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:39:01 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:39:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 15:44:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T15:44:32Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-08.xml b/glsa-200503-08.xml
index f9e5f54d..4621b75d 100644
--- a/glsa-200503-08.xml
+++ b/glsa-200503-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-08">
<title>OpenMotif, LessTif: New libXpm buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenMotif and LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>March 04, 2005</announced>
- <revised>March 04, 2005: 01</revised>
+ <announced>2005-03-04</announced>
+ <revised>2005-03-04: 01</revised>
<bug>83655</bug>
<bug>83656</bug>
<access>remote</access>
@@ -63,18 +62,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/lesstif-0.94.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/lesstif-0.94.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:43:36 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:43:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 09:21:40 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T09:21:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 21:47:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T21:47:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-09.xml b/glsa-200503-09.xml
index d9b8ddb7..5541c602 100644
--- a/glsa-200503-09.xml
+++ b/glsa-200503-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-09">
<title>xv: Filename handling vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>March 04, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83686</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xv-3.10a-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xv-3.10a-r10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0665">CVE-2005-0665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0665">CVE-2005-0665</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:42:57 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:42:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:55:00 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:55:00Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 21:51:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T21:51:14Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-10.xml b/glsa-200503-10.xml
index c670e550..a810dbff 100644
--- a/glsa-200503-10.xml
+++ b/glsa-200503-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-10">
<title>Mozilla Firefox: Various vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
interacting with privileged content.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>March 04, 2005</announced>
- <revised>March 04, 2005: 01</revised>
+ <announced>2005-03-04</announced>
+ <revised>2005-03-04: 01</revised>
<bug>83267</bug>
<access>remote and local</access>
<affected>
@@ -102,38 +101,38 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.1"</code>
<p>
All Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0586">CAN-2005-0586</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0589">CAN-2005-0589</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0586">CAN-2005-0586</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0589">CAN-2005-0589</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 4 Mar 2005 10:53:24 +0000">
+ <metadata tag="submitter" timestamp="2005-03-04T10:53:24Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 4 Mar 2005 12:44:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-04T12:44:33Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-11.xml b/glsa-200503-11.xml
index 27c0df1f..ae8c7a8e 100644
--- a/glsa-200503-11.xml
+++ b/glsa-200503-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-11">
<title>ImageMagick: Filename handling vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>March 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83542</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397">CVE-2005-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397">CVE-2005-0397</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:33 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:44:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:24:40 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:24:40Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 13:03:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T13:03:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-12.xml b/glsa-200503-12.xml
index 611c6c28..5686e364 100644
--- a/glsa-200503-12.xml
+++ b/glsa-200503-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-12">
<title>Hashcash: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Hashcash</product>
- <announced>March 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83541</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hashcash-1.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0687">CVE-2005-0687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0687">CVE-2005-0687</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:06 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:44:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:42:04 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:42:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 10:00:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T10:00:09Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-13.xml b/glsa-200503-13.xml
index a86ca959..74209263 100644
--- a/glsa-200503-13.xml
+++ b/glsa-200503-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-13">
<title>mlterm: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mlterm</product>
- <announced>March 07, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>84174</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/mlterm-2.9.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/mlterm-2.9.2"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/project/shownotes.php?release_id=310416">mlterm ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0686">CVE-2005-0686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0686">CVE-2005-0686</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 5 Mar 2005 16:23:09 +0000">
+ <metadata tag="requester" timestamp="2005-03-05T16:23:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 10:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T10:05:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 7 Mar 2005 01:52:03 +0000">
+ <metadata tag="submitter" timestamp="2005-03-07T01:52:03Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-14.xml b/glsa-200503-14.xml
index 079de819..030b9260 100644
--- a/glsa-200503-14.xml
+++ b/glsa-200503-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-14">
<title>KDE dcopidlng: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">dcopidlng</product>
- <announced>March 07, 2005</announced>
- <revised>March 07, 2005: 01</revised>
+ <announced>2005-03-07</announced>
+ <revised>2005-03-07: 01</revised>
<bug>81652</bug>
<access>local</access>
<affected>
@@ -55,12 +54,12 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0365">CAN-2005-0365</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0365">CAN-2005-0365</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 21:01:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T21:01:57Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 09:59:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T09:59:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-15.xml b/glsa-200503-15.xml
index 7a6d0cd2..cf3c3651 100644
--- a/glsa-200503-15.xml
+++ b/glsa-200503-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-15">
<title>X.org: libXpm vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
X.org, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">X.org</product>
- <announced>March 12, 2005</announced>
- <revised>March 12, 2005: 02</revised>
+ <announced>2005-03-12</announced>
+ <revised>2005-03-12: 02</revised>
<bug>83598</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
# emerge --ask --oneshot --verbose x11-base/xorg-x11</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
<uri link="https://bugs.freedesktop.org/show_bug.cgi?id=1920">Freedesktop bug</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 6 Mar 2005 13:19:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-06T13:19:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 7 Mar 2005 11:11:00 +0000">
+ <metadata tag="submitter" timestamp="2005-03-07T11:11:00Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Mar 2005 13:22:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-11T13:22:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-16.xml b/glsa-200503-16.xml
index fba6a0ac..64de0ea2 100644
--- a/glsa-200503-16.xml
+++ b/glsa-200503-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-16">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>March 12, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-03-12</announced>
+ <revised>2006-05-22: 03</revised>
<bug>84547</bug>
<access>remote</access>
<affected>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0704">CAN-2005-0704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0705">CAN-2005-0705</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0739">CAN-2005-0739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0765">CVE-2005-0765</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0766">CVE-2005-0766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0704">CAN-2005-0704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0705">CAN-2005-0705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0739">CAN-2005-0739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0765">CVE-2005-0765</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0766">CVE-2005-0766</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00018.html">Ethereal enpa-sa-00018</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 9 Mar 2005 13:39:26 +0000">
+ <metadata tag="submitter" timestamp="2005-03-09T13:39:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 15:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T15:50:23Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-17.xml b/glsa-200503-17.xml
index 029cfb4d..0f8d0fc2 100644
--- a/glsa-200503-17.xml
+++ b/glsa-200503-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-17">
<title>libexif: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>March 12, 2005</announced>
- <revised>March 12, 2005: 01</revised>
+ <announced>2005-03-12</announced>
+ <revised>2005-03-12: 01</revised>
<bug>84076</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.5.12-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.5.12-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664">CAN-2005-0664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664">CAN-2005-0664</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2005 16:28:06 +0000">
+ <metadata tag="requester" timestamp="2005-03-12T16:28:06Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 17:56:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T17:56:45Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2005 18:48:27 +0000">
+ <metadata tag="submitter" timestamp="2005-03-12T18:48:27Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-18.xml b/glsa-200503-18.xml
index bd008049..f27152a3 100644
--- a/glsa-200503-18.xml
+++ b/glsa-200503-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-18">
<title>Ringtone Tools: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">ringtonetools</product>
- <announced>March 15, 2005</announced>
- <revised>March 15, 2005: 01</revised>
+ <announced>2005-03-15</announced>
+ <revised>2005-03-15: 01</revised>
<bug>74700</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-mobilephone/ringtonetools-2.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-mobilephone/ringtonetools-2.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1292">CAN-2004-1292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1292">CAN-2004-1292</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2005 02:28:50 +0000">
+ <metadata tag="requester" timestamp="2005-03-15T02:28:50Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 09:56:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T09:56:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 14:11:25 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T14:11:25Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-19.xml b/glsa-200503-19.xml
index 11627d58..cf9780ec 100644
--- a/glsa-200503-19.xml
+++ b/glsa-200503-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-19">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
overwriting of local files or to the execution of arbitrary code.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>March 16, 2005</announced>
- <revised>March 16, 2005: 02</revised>
+ <announced>2005-03-16</announced>
+ <revised>2005-03-16: 02</revised>
<bug>84819</bug>
<access>remote and local</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709">CAN-2005-0709</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710">CAN-2005-0710</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711">CAN-2005-0711</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709">CAN-2005-0709</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710">CAN-2005-0710</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711">CAN-2005-0711</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 05:33:03 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T05:33:03Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 06:04:30 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T06:04:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 15:41:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T15:41:11Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-20.xml b/glsa-200503-20.xml
index 2d3869fe..17f89a8a 100644
--- a/glsa-200503-20.xml
+++ b/glsa-200503-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-20">
<title>curl: NTLM response buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 16, 2005</announced>
- <revised>March 16, 2005: 01</revised>
+ <announced>2005-03-16</announced>
+ <revised>2005-03-16: 01</revised>
<bug>82534</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.13.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.13.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490">CAN-2005-0490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490">CAN-2005-0490</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2005 16:36:42 +0000">
+ <metadata tag="requester" timestamp="2005-03-12T16:36:42Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 17:56:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T17:56:09Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Mar 2005 05:48:14 +0000">
+ <metadata tag="submitter" timestamp="2005-03-14T05:48:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-21.xml b/glsa-200503-21.xml
index 74312893..94539cc3 100644
--- a/glsa-200503-21.xml
+++ b/glsa-200503-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-21">
<title>Grip: CDDB response overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
response, potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">grip</product>
- <announced>March 17, 2005</announced>
- <revised>March 17, 2005: 01</revised>
+ <announced>2005-03-17</announced>
+ <revised>2005-03-17: 01</revised>
<bug>84704</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/grip-3.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/grip-3.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
- <uri link="http://sourceforge.net/tracker/?group_id=3714&amp;atid=103714&amp;func=detail&amp;aid=834724">Original Bug Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
+ <uri link="https://sourceforge.net/tracker/?group_id=3714&amp;atid=103714&amp;func=detail&amp;aid=834724">Original Bug Report</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 20:06:50 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T20:06:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 23:47:13 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T23:47:13Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Mar 2005 10:03:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-17T10:03:26Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-22.xml b/glsa-200503-22.xml
index 440e9e3d..f9fd1d34 100644
--- a/glsa-200503-22.xml
+++ b/glsa-200503-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-22">
<title>KDE: Local Denial of Service</title>
<synopsis>
KDE is vulnerable to a local Denial of Service attack.
</synopsis>
<product type="ebuild">kde, dcopserver</product>
- <announced>March 19, 2005</announced>
- <revised>March 19, 2005: 01</revised>
+ <announced>2005-03-19</announced>
+ <revised>2005-03-19: 01</revised>
<bug>83814</bug>
<access>local</access>
<affected>
@@ -51,12 +50,12 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0396">CAN-2005-0396</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0396">CAN-2005-0396</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Mar 2005 06:00:10 +0000">
+ <metadata tag="submitter" timestamp="2005-03-14T06:00:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 19 Mar 2005 07:23:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-19T07:23:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-23.xml b/glsa-200503-23.xml
index 7c58343a..085e511a 100644
--- a/glsa-200503-23.xml
+++ b/glsa-200503-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-23">
<title>rxvt-unicode: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">rxvt-unicode</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>84680</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-unicode-5.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-unicode-5.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0764">CAN-2005-0764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0764">CAN-2005-0764</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2005 14:52:07 +0000">
+ <metadata tag="requester" timestamp="2005-03-15T14:52:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 23:51:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T23:51:13Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2005 16:52:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-20T16:52:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-24.xml b/glsa-200503-24.xml
index fa844335..4e178cae 100644
--- a/glsa-200503-24.xml
+++ b/glsa-200503-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-24">
<title>LTris: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">LTris</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>85770</bug>
<access>local</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-puzzle/ltris-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-puzzle/ltris-1.0.10"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Fri, 18 Mar 2005 18:14:03 +0000">
+ <metadata tag="requester" timestamp="2005-03-18T18:14:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 14:43:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T14:43:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2005 17:00:38 +0000">
+ <metadata tag="submitter" timestamp="2005-03-20T17:00:38Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-25.xml b/glsa-200503-25.xml
index 7beb0c82..f379c7b3 100644
--- a/glsa-200503-25.xml
+++ b/glsa-200503-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-25">
<title>OpenSLP: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenSLP</product>
- <announced>March 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>85347</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/openslp-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/openslp-1.2.1"</code>
</resolution>
<references>
<uri link="http://www.novell.com/linux/security/advisories/2005_15_openslp.html">SUSE Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0769">CVE-2005-0769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0769">CVE-2005-0769</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Mar 2005 22:37:07 +0000">
+ <metadata tag="requester" timestamp="2005-03-16T22:37:07Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Mar 2005 14:53:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-17T14:53:57Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 20:02:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T20:02:39Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-26.xml b/glsa-200503-26.xml
index 6e722122..cf60bb09 100644
--- a/glsa-200503-26.xml
+++ b/glsa-200503-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-26">
<title>Sylpheed, Sylpheed-claws: Message reply overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
when replying to specially crafted messages.
</synopsis>
<product type="ebuild">sylpheed sylpheed-claws</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>84056</bug>
<access>remote</access>
<affected>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-1.0.3"</code>
<p>
All Sylpheed-claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.3"</code>
</resolution>
<references>
<uri link="http://sylpheed.good-day.net/#changes">Sylpheed ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667">CAN-2005-0667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667">CAN-2005-0667</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 20:05:52 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T20:05:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 14:35:33 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T14:35:33Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 22:41:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T22:41:22Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-27.xml b/glsa-200503-27.xml
index 3ae24aaa..3b469457 100644
--- a/glsa-200503-27.xml
+++ b/glsa-200503-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-27">
<title>Xzabite dyndnsupdate: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">dyndnsupdate</product>
- <announced>March 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>84659</bug>
<access>remote</access>
<affected>
@@ -53,12 +52,12 @@
# emerge --unmerge net-misc/dyndnsupdate</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0830">CVE-2005-0830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0830">CVE-2005-0830</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 21 Mar 2005 09:32:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-21T09:32:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Mar 2005 14:30:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-21T14:30:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-28.xml b/glsa-200503-28.xml
index 5cf43afe..f4ccee94 100644
--- a/glsa-200503-28.xml
+++ b/glsa-200503-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-28">
<title>Sun Java: Web Start argument injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">Java</product>
- <announced>March 24, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>85804</bug>
<access>remote</access>
<affected>
@@ -57,26 +56,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.07"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.07"</code>
</resolution>
<references>
<uri link="http://jouko.iki.fi/adv/ws.html">Jouko Pynnonen advisory</uri>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57740-1">Sun Microsystems Alert Notification</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836">CVE-2005-0836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836">CVE-2005-0836</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Mar 2005 21:40:30 +0000">
+ <metadata tag="requester" timestamp="2005-03-20T21:40:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 21:41:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T21:41:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Mar 2005 15:33:09 +0000">
+ <metadata tag="submitter" timestamp="2005-03-23T15:33:09Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200503-29.xml b/glsa-200503-29.xml
index ebeee9ed..5ef4e03a 100644
--- a/glsa-200503-29.xml
+++ b/glsa-200503-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-29">
<title>GnuPG: OpenPGP protocol attack</title>
<synopsis>
@@ -8,8 +7,8 @@
message.
</synopsis>
<product type="ebuild">GnuPG</product>
- <announced>March 24, 2005</announced>
- <revised>March 24, 2005: 01</revised>
+ <announced>2005-03-24</announced>
+ <revised>2005-03-24: 01</revised>
<bug>85547</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.1"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/303094">CERT VU#303094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0366">CAN-2005-0366</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/303094">CERT VU#303094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0366">CAN-2005-0366</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 17:12:46 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T17:12:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 12:34:11 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T12:34:11Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 24 Mar 2005 21:44:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-24T21:44:14Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-30.xml b/glsa-200503-30.xml
index 077b7e9d..1797a53d 100644
--- a/glsa-200503-30.xml
+++ b/glsa-200503-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-30">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
into trusting fake web sites or interacting with privileged content.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84074</bug>
<access>remote and local</access>
<affected>
@@ -100,39 +99,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.6"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 09:19:22 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T09:19:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 12:49:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T12:49:52Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-31.xml b/glsa-200503-31.xml
index 6a9c3db2..3240cb83 100644
--- a/glsa-200503-31.xml
+++ b/glsa-200503-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-31">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
sidebars.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>86148</bug>
<access>remote</access>
<affected>
@@ -73,25 +72,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.2"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0402">CAN-2005-0402</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0402">CAN-2005-0402</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 09:29:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T09:29:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 12:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T12:27:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-32.xml b/glsa-200503-32.xml
index 6965ffc6..b1607a23 100644
--- a/glsa-200503-32.xml
+++ b/glsa-200503-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-32">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code through malicious GIF images.
</synopsis>
<product type="ebuild">Thunderbird</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84075</bug>
<access>remote</access>
<affected>
@@ -68,26 +67,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.2"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 10:54:32 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T10:54:32Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 08:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T08:41:58Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-33.xml b/glsa-200503-33.xml
index 049b4e4d..3714a603 100644
--- a/glsa-200503-33.xml
+++ b/glsa-200503-33.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-33">
<title>IPsec-Tools: racoon Denial of Service</title>
<synopsis>
IPsec-Tools' racoon is affected by a remote Denial of Service vulnerability.
</synopsis>
<product type="ebuild">IPsec-Tools</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84479</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0398">CAN-2005-0398</uri>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&amp;forum_id=32000">ipsec-tools-devel posting</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0398">CAN-2005-0398</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=6787713&amp;forum_id=32000">ipsec-tools-devel posting</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 16:03:41 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T16:03:41Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 24 Mar 2005 09:50:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-24T09:50:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 21:24:17 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T21:24:17Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200503-34.xml b/glsa-200503-34.xml
index d3a27c7e..648a7d48 100644
--- a/glsa-200503-34.xml
+++ b/glsa-200503-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-34">
<title>mpg321: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg321</product>
- <announced>March 28, 2005</announced>
- <revised>March 28, 2005: 01</revised>
+ <announced>2005-03-28</announced>
+ <revised>2005-03-28: 01</revised>
<bug>86033</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg321-0.2.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg321-0.2.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0969">CVE-2003-0969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0969">CVE-2003-0969</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 14:50:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T14:50:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 12:50:11 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T12:50:11Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Mar 2005 10:18:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-27T10:18:10Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200503-35.xml b/glsa-200503-35.xml
index 4647de95..fc25b3fb 100644
--- a/glsa-200503-35.xml
+++ b/glsa-200503-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-35">
<title>Smarty: Template vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a remote attacker to execute arbitrary PHP code.
</synopsis>
<product type="ebuild">smarty</product>
- <announced>March 30, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-03-30</announced>
+ <revised>2006-05-22: 03</revised>
<bug>86488</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/smarty-2.6.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/smarty-2.6.9"</code>
</resolution>
<references>
- <uri link="http://smarty.php.net/misc/NEWS">Smarty ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0913">CVE-2005-0913</uri>
+ <uri link="https://smarty.php.net/misc/NEWS">Smarty ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0913">CVE-2005-0913</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Mar 2005 17:18:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-24T17:18:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Mar 2005 13:11:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-28T13:11:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Mar 2005 13:23:33 +0000">
+ <metadata tag="submitter" timestamp="2005-03-28T13:23:33Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200503-36.xml b/glsa-200503-36.xml
index 1b48e638..32973b6e 100644
--- a/glsa-200503-36.xml
+++ b/glsa-200503-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-36">
<title>netkit-telnetd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">netkit-telnetd</product>
- <announced>March 31, 2005</announced>
- <revised>March 31, 2005: 01</revised>
+ <announced>2005-03-31</announced>
+ <revised>2005-03-31: 01</revised>
<bug>87211</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/netkit-telnetd-0.17-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/netkit-telnetd-0.17-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://www.idefense.com/application/poi/display?id=220&amp;type=vulnerabilities">iDEFENSE Advisory 03-28-05</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Mar 2005 08:13:45 +0000">
+ <metadata tag="requester" timestamp="2005-03-30T08:13:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Mar 2005 13:44:36 +0000">
+ <metadata tag="submitter" timestamp="2005-03-30T13:44:36Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Mar 2005 19:43:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-30T19:43:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200503-37.xml b/glsa-200503-37.xml
index 4c21db1c..1455ea41 100644
--- a/glsa-200503-37.xml
+++ b/glsa-200503-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-37">
<title>LimeWire: Disclosure of sensitive information</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">LimeWire</product>
- <announced>March 31, 2005</announced>
- <revised>March 31, 2005: 01</revised>
+ <announced>2005-03-31</announced>
+ <revised>2005-03-31: 01</revised>
<bug>85380</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/limewire-4.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/limewire-4.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0788">CAN-2005-0788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0789">CAN-2005-0789</uri>
- <uri link="http://secunia.com/advisories/14555/">Secunia Advisory SA14555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0788">CAN-2005-0788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0789">CAN-2005-0789</uri>
+ <uri link="https://secunia.com/advisories/14555/">Secunia Advisory SA14555</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Mar 2005 14:57:35 +0000">
+ <metadata tag="requester" timestamp="2005-03-30T14:57:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Mar 2005 14:58:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-30T14:58:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Mar 2005 16:12:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-30T16:12:57Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200504-01.xml b/glsa-200504-01.xml
index 71d20af6..bd5f2ece 100644
--- a/glsa-200504-01.xml
+++ b/glsa-200504-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-01">
<title>telnet-bsd: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">telnet</product>
- <announced>April 01, 2005</announced>
- <revised>April 01, 2005: 01</revised>
+ <announced>2005-04-01</announced>
+ <revised>2005-04-01: 01</revised>
<bug>87019</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/telnet-bsd-1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/telnet-bsd-1.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
<uri link="http://www.idefense.com/application/poi/display?id=221&amp;type=vulnerabilities">IDEF0867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://www.idefense.com/application/poi/display?id=220&amp;type=vulnerabilities">IDEF0866</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Mar 2005 16:15:13 +0000">
+ <metadata tag="requester" timestamp="2005-03-29T16:15:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Mar 2005 17:09:56 +0000">
+ <metadata tag="submitter" timestamp="2005-03-29T17:09:56Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Mar 2005 06:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-31T06:01:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-02.xml b/glsa-200504-02.xml
index e5cdd5c8..ce865c7f 100644
--- a/glsa-200504-02.xml
+++ b/glsa-200504-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-02">
<title>Sylpheed, Sylpheed-claws: Buffer overflow on message display</title>
<synopsis>
@@ -8,8 +7,8 @@
when displaying messages with specially crafted attachments.
</synopsis>
<product type="ebuild">sylpheed</product>
- <announced>April 02, 2005</announced>
- <revised>April 02, 2005: 01</revised>
+ <announced>2005-04-02</announced>
+ <revised>2005-04-02: 01</revised>
<bug>86541</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-1.0.4"</code>
<p>
All Sylpheed-claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.4"</code>
</resolution>
<references>
<uri link="http://sylpheed.good-day.net/#changes">Sylpheed ChangeLog</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 31 Mar 2005 08:06:56 +0000">
+ <metadata tag="submitter" timestamp="2005-03-31T08:06:56Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Mar 2005 08:07:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-31T08:07:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-03.xml b/glsa-200504-03.xml
index ef44389f..55ae1c00 100644
--- a/glsa-200504-03.xml
+++ b/glsa-200504-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-03">
<title>Dnsmasq: Poisoning and Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service from the local network.
</synopsis>
<product type="ebuild">Dnsmasq</product>
- <announced>April 04, 2005</announced>
- <revised>April 04, 2005: 01</revised>
+ <announced>2005-04-04</announced>
+ <revised>2005-04-04: 01</revised>
<bug>86718</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.22"</code>
</resolution>
<references>
<uri link="http://www.thekelleys.org.uk/dnsmasq/CHANGELOG">Dnsmasq Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Mar 2005 07:00:46 +0000">
+ <metadata tag="requester" timestamp="2005-03-28T07:00:46Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Mar 2005 13:54:22 +0000">
+ <metadata tag="submitter" timestamp="2005-03-28T13:54:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 4 Apr 2005 11:10:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-04T11:10:45Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-04.xml b/glsa-200504-04.xml
index 301e37aa..3c9e6b5d 100644
--- a/glsa-200504-04.xml
+++ b/glsa-200504-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-04">
<title>mit-krb5: Multiple buffer overflows in telnet client</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">telnet</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 01</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 01</revised>
<bug>87145</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.3.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.3.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-001-telnet.txt">MITKRB5-SA-2005-001</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 1 Apr 2005 09:42:26 +0000">
+ <metadata tag="submitter" timestamp="2005-04-01T09:42:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 09:05:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T09:05:02Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-05.xml b/glsa-200504-05.xml
index 1a05644d..6151a33c 100644
--- a/glsa-200504-05.xml
+++ b/glsa-200504-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-05">
<title>Gaim: Denial of Service issues</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 03</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 03</revised>
<bug>87903</bug>
<access>remote</access>
<affected>
@@ -54,21 +53,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0967">CAN-2005-0967</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0966">CAN-2005-0966</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0965">CAN-2005-0965</uri>
- <uri link="http://gaim.sourceforge.net/security/">Gaim Vulnerability Index</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0967">CAN-2005-0967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0966">CAN-2005-0966</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0965">CAN-2005-0965</uri>
+ <uri link="https://gaim.sourceforge.net/security/">Gaim Vulnerability Index</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 4 Apr 2005 16:07:52 +0000">
+ <metadata tag="requester" timestamp="2005-04-04T16:07:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 4 Apr 2005 16:59:15 +0000">
+ <metadata tag="submitter" timestamp="2005-04-04T16:59:15Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 11:01:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T11:01:53Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200504-06.xml b/glsa-200504-06.xml
index 12153820..14d0f29d 100644
--- a/glsa-200504-06.xml
+++ b/glsa-200504-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-06">
<title>sharutils: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">sharutils</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 01</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 01</revised>
<bug>87939</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/sharutils-4.2.1-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/sharutils-4.2.1-r11"</code>
</resolution>
<references>
- <uri link="http://www.ubuntulinux.org/support/documentation/usn/usn-104-1">Ubuntu Advisory</uri>
+ <uri link="https://www.ubuntulinux.org/support/documentation/usn/usn-104-1">Ubuntu Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 5 Apr 2005 07:42:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-05T07:42:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 5 Apr 2005 13:07:06 +0000">
+ <metadata tag="submitter" timestamp="2005-04-05T13:07:06Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 20:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T20:15:09Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200504-07.xml b/glsa-200504-07.xml
index 72b81b11..b39d0098 100644
--- a/glsa-200504-07.xml
+++ b/glsa-200504-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-07">
<title>GnomeVFS, libcdaudio: CDDB response overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">GnomeVFS</product>
- <announced>April 08, 2005</announced>
- <revised>April 13, 2005: 02</revised>
+ <announced>2005-04-08</announced>
+ <revised>2005-04-13: 02</revised>
<bug>84936</bug>
<access>remote</access>
<affected>
@@ -63,16 +62,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libcdaudio-0.99.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libcdaudio-0.99.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
- <uri link="/security/en/glsa/glsa-200503-21.xml">GLSA 200503-21</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200503-21.xml">GLSA 200503-21</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 5 Apr 2005 09:35:13 +0000">
+ <metadata tag="submitter" timestamp="2005-04-05T09:35:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Apr 2005 11:17:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-08T11:17:13Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-08.xml b/glsa-200504-08.xml
index b17f7101..3a98d4f2 100644
--- a/glsa-200504-08.xml
+++ b/glsa-200504-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-08">
<title>phpMyAdmin: Cross-site scripting vulnerability</title>
<synopsis>
phpMyAdmin is vulnerable to a cross-site scripting attack.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>April 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>87952</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.2_rc1"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3">PMASA-2005-3</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0992">CVE-2005-0992</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3">PMASA-2005-3</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0992">CVE-2005-0992</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Apr 2005 23:16:29 +0000">
+ <metadata tag="requester" timestamp="2005-04-10T23:16:29Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Apr 2005 00:34:48 +0000">
+ <metadata tag="submitter" timestamp="2005-04-11T00:34:48Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 00:35:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-11T00:35:39Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200504-09.xml b/glsa-200504-09.xml
index 1bdaf21c..4fcd1fc7 100644
--- a/glsa-200504-09.xml
+++ b/glsa-200504-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-09">
<title>Axel: Vulnerability in HTTP redirection handling</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">Axel</product>
- <announced>April 12, 2005</announced>
- <revised>April 12, 2005: 01</revised>
+ <announced>2005-04-12</announced>
+ <revised>2005-04-12: 01</revised>
<bug>88264</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/axel-1.0b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/axel-1.0b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0390">CAN-2005-0390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0390">CAN-2005-0390</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Apr 2005 18:36:13 +0000">
+ <metadata tag="requester" timestamp="2005-04-11T18:36:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Apr 2005 19:29:05 +0000">
+ <metadata tag="submitter" timestamp="2005-04-11T19:29:05Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Apr 2005 11:48:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-12T11:48:11Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200504-10.xml b/glsa-200504-10.xml
index b160c2cd..d2bee6b5 100644
--- a/glsa-200504-10.xml
+++ b/glsa-200504-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-10">
<title>Gld: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code as the root user.
</synopsis>
<product type="ebuild">Gld</product>
- <announced>April 13, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88904</bug>
<access>remote</access>
<affected>
@@ -47,17 +46,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/gld-1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/gld-1.5"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/alerts/2005/Apr/1013678.html">SecurityTracker ID 1013678</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099">CVE-2005-1099</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1100">CVE-2005-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099">CVE-2005-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1100">CVE-2005-1100</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 13 Apr 2005 10:26:52 +0000">
+ <metadata tag="submitter" timestamp="2005-04-13T10:26:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Apr 2005 12:04:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-13T12:04:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-11.xml b/glsa-200504-11.xml
index 659fdfb5..a817d995 100644
--- a/glsa-200504-11.xml
+++ b/glsa-200504-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-11">
<title>JunkBuster: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
certain configurations may allow an attacker to modify settings.
</synopsis>
<product type="ebuild">junkbuster</product>
- <announced>April 13, 2005</announced>
- <revised>April 21, 2005: 02</revised>
+ <announced>2005-04-13</announced>
+ <revised>2005-04-21: 02</revised>
<bug>88537</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/junkbuster-2.0.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/junkbuster-2.0.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1108">CAN-2005-1108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1109">CAN-2005-1109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1108">CAN-2005-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1109">CAN-2005-1109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Apr 2005 20:24:12 +0000">
+ <metadata tag="requester" timestamp="2005-04-12T20:24:12Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Apr 2005 21:28:36 +0000">
+ <metadata tag="submitter" timestamp="2005-04-12T21:28:36Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Apr 2005 08:43:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-13T08:43:25Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-12.xml b/glsa-200504-12.xml
index 210e00bf..a77b58d3 100644
--- a/glsa-200504-12.xml
+++ b/glsa-200504-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-12">
<title>rsnapshot: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
in privilege escalation.
</synopsis>
<product type="ebuild">rsnapshot</product>
- <announced>April 13, 2005</announced>
- <revised>December 30, 2007: 05</revised>
+ <announced>2005-04-13</announced>
+ <revised>2007-12-30: 05</revised>
<bug>88681</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
</resolution>
<references>
<uri link="http://www.rsnapshot.org/security/2005/001.html">rsnapshot Security Advisory 001</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1064">CVE-2005-1064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1064">CVE-2005-1064</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Apr 2005 07:57:07 +0000">
+ <metadata tag="requester" timestamp="2005-04-11T07:57:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 21:22:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-11T21:22:40Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Apr 2005 08:59:16 +0000">
+ <metadata tag="submitter" timestamp="2005-04-13T08:59:16Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-13.xml b/glsa-200504-13.xml
index a3806ada..f2757349 100644
--- a/glsa-200504-13.xml
+++ b/glsa-200504-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-13">
<title>OpenOffice.Org: DOC document Heap Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
documents, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">OpenOffice</product>
- <announced>April 15, 2005</announced>
- <revised>May 08, 2005: 02</revised>
+ <announced>2005-04-15</announced>
+ <revised>2005-05-08: 02</revised>
<bug>88863</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-1.1.4-r1"</code>
<p>
All OpenOffice.Org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-1.1.4-r1"</code>
<p>
All OpenOffice.Org Ximian users should upgrade to the latest version:
</p>
@@ -85,16 +84,16 @@
</p>
</resolution>
<references>
- <uri link="http://www.openoffice.org/issues/show_bug.cgi?id=46388">OpenOffice.Org Issue 46388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0941">CAN-2005-0941</uri>
+ <uri link="https://www.openoffice.org/issues/show_bug.cgi?id=46388">OpenOffice.Org Issue 46388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0941">CAN-2005-0941</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Apr 2005 09:08:22 +0000">
+ <metadata tag="requester" timestamp="2005-04-13T09:08:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Apr 2005 15:46:07 +0000">
+ <metadata tag="submitter" timestamp="2005-04-14T15:46:07Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Apr 2005 07:51:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-15T07:51:32Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-14.xml b/glsa-200504-14.xml
index 677435e7..b810714a 100644
--- a/glsa-200504-14.xml
+++ b/glsa-200504-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-14">
<title>monkeyd: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>April 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>87916</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/monkeyd-0.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/monkeyd-0.9.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1122">CVE-2005-1122</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1123">CVE-2005-1123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1122">CVE-2005-1122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1123">CVE-2005-1123</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Apr 2005 15:11:45 +0000">
+ <metadata tag="requester" timestamp="2005-04-14T15:11:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Apr 2005 20:09:53 +0000">
+ <metadata tag="submitter" timestamp="2005-04-14T20:09:53Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Apr 2005 16:10:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-15T16:10:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-15.xml b/glsa-200504-15.xml
index e5dfac0e..53dcbad2 100644
--- a/glsa-200504-15.xml
+++ b/glsa-200504-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-15">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>April 18, 2005</announced>
- <revised>April 18, 2005: 01</revised>
+ <announced>2005-04-18</announced>
+ <revised>2005-04-18: 01</revised>
<bug>87517</bug>
<access>remote</access>
<affected>
@@ -65,31 +64,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.3.11"</code>
<p>
All mod_php users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/mod_php-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/mod_php-4.3.11"</code>
<p>
All php-cgi users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-cgi-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-cgi-4.3.11"</code>
</resolution>
<references>
- <uri link="http://www.php.net/release_4_3_11.php">PHP 4.3.11 Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0524">CAN-2005-0524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0525">CAN-2005-0525</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1042">CAN-2005-1042</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1043">CAN-2005-1043</uri>
+ <uri link="https://www.php.net/release_4_3_11.php">PHP 4.3.11 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0524">CAN-2005-0524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0525">CAN-2005-0525</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1042">CAN-2005-1042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1043">CAN-2005-1043</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 17 Apr 2005 16:51:49 +0000">
+ <metadata tag="submitter" timestamp="2005-04-17T16:51:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Apr 2005 16:51:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-17T16:51:59Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-16.xml b/glsa-200504-16.xml
index 14ce82f7..467fb708 100644
--- a/glsa-200504-16.xml
+++ b/glsa-200504-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-16">
<title>CVS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to remotely compromise a CVS server or cause a DoS.
</synopsis>
<product type="ebuild">CVS</product>
- <announced>April 18, 2005</announced>
- <revised>April 22, 2005: 03</revised>
+ <announced>2005-04-18</announced>
+ <revised>2005-04-22: 03</revised>
<bug>86476</bug>
<bug>89579</bug>
<access>remote</access>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cvs-1.11.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cvs-1.11.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 12 Apr 2005 18:45:36 +0000">
+ <metadata tag="submitter" timestamp="2005-04-12T18:45:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Apr 2005 20:37:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-18T20:37:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-17.xml b/glsa-200504-17.xml
index 51225907..134a2c49 100644
--- a/glsa-200504-17.xml
+++ b/glsa-200504-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-17">
<title>XV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>April 19, 2005</announced>
- <revised>April 19, 2005: 01</revised>
+ <announced>2005-04-19</announced>
+ <revised>2005-04-19: 01</revised>
<bug>88742</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xv-3.10a-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xv-3.10a-r11"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Fri, 15 Apr 2005 12:13:29 +0000">
+ <metadata tag="requester" timestamp="2005-04-15T12:13:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 15 Apr 2005 13:15:45 +0000">
+ <metadata tag="submitter" timestamp="2005-04-15T13:15:45Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 04:58:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T04:58:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-18.xml b/glsa-200504-18.xml
index 536c1bcc..7f3dc367 100644
--- a/glsa-200504-18.xml
+++ b/glsa-200504-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-18">
<title>Mozilla Firefox, Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
JavaScript code with elevated privileges.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>April 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89303</bug>
<bug>89305</bug>
<access>remote</access>
@@ -96,40 +95,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.3"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.3"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.7"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.7"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153">CVE-2005-1153</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1154">CVE-2005-1154</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1155">CVE-2005-1155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156">CVE-2005-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1159">CVE-2005-1159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160">CVE-2005-1160</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153">CVE-2005-1153</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1154">CVE-2005-1154</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1155">CVE-2005-1155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156">CVE-2005-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1159">CVE-2005-1159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160">CVE-2005-1160</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Apr 2005 08:55:50 +0000">
+ <metadata tag="submitter" timestamp="2005-04-18T08:55:50Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 05:17:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T05:17:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-19.xml b/glsa-200504-19.xml
index db4e9819..ccd8f448 100644
--- a/glsa-200504-19.xml
+++ b/glsa-200504-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-19">
<title>MPlayer: Two heap overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>April 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89277</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre6-r4"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/homepage/design7/news.html#vuln10">MPlayer News: Real RTSP heap overflow</uri>
<uri link="http://www.mplayerhq.hu/homepage/design7/news.html#vuln11">MPlayer News: MMST heap overflow</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1195">CVE-2005-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1195">CVE-2005-1195</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Apr 2005 16:59:51 +0000">
+ <metadata tag="requester" timestamp="2005-04-16T16:59:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Apr 2005 09:17:55 +0000">
+ <metadata tag="submitter" timestamp="2005-04-18T09:17:55Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 07:28:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T07:28:03Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-20.xml b/glsa-200504-20.xml
index 3573e291..1faa03c3 100644
--- a/glsa-200504-20.xml
+++ b/glsa-200504-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-20">
<title>openMosixview: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks, potentially allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">openMosixview</product>
- <announced>April 21, 2005</announced>
- <revised>April 21, 2005: 01</revised>
+ <announced>2005-04-21</announced>
+ <revised>2005-04-21: 01</revised>
<bug>86686</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/openmosixview-1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/openmosixview-1.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0894">CAN-2005-0894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0894">CAN-2005-0894</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 20 Apr 2005 11:45:51 +0000">
+ <metadata tag="submitter" timestamp="2005-04-20T11:45:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Apr 2005 11:46:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-20T11:46:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-21.xml b/glsa-200504-21.xml
index 742232a8..69de7901 100644
--- a/glsa-200504-21.xml
+++ b/glsa-200504-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-21">
<title>RealPlayer, Helix Player: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">RealPlayer</product>
- <announced>April 22, 2005</announced>
- <revised>April 22, 2005: 01</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-04-22: 01</revised>
<bug>89862</bug>
<access>remote</access>
<affected>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.4"</code>
<p>
All Helix Player users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/helixplayer-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/helixplayer-1.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0755">CAN-2005-0755</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0755">CAN-2005-0755</uri>
<uri link="http://service.real.com/help/faq/security/050419_player/EN/">RealNetworks Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Apr 2005 08:25:50 +0000">
+ <metadata tag="requester" timestamp="2005-04-21T08:25:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 21 Apr 2005 21:28:38 +0000">
+ <metadata tag="submitter" timestamp="2005-04-21T21:28:38Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 07:59:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T07:59:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-22.xml b/glsa-200504-22.xml
index 79a10fbb..378954c1 100644
--- a/glsa-200504-22.xml
+++ b/glsa-200504-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-22">
<title>KDE kimgio: PCX handling buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>April 22, 2005</announced>
- <revised>April 22, 2005: 01</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-04-22: 01</revised>
<bug>88862</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046">CAN-2005-1046</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050421-1.txt">KDE Security Advisory: kimgio input validation errors</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046">CAN-2005-1046</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050421-1.txt">KDE Security Advisory: kimgio input validation errors</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 06:44:43 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T06:44:43Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 11:51:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T11:51:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-23.xml b/glsa-200504-23.xml
index 179cb162..451ef660 100644
--- a/glsa-200504-23.xml
+++ b/glsa-200504-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-23">
<title>Kommander: Insecure remote script execution</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Kommander</product>
- <announced>April 22, 2005</announced>
- <revised>May 20, 2005: 02</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-05-20: 02</revised>
<bug>89092</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdewebdev-3.3.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdewebdev-3.3.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754">CAN-2005-0754</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050420-1.txt">KDE Security Advisory: Kommander untrusted code execution</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754">CAN-2005-0754</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050420-1.txt">KDE Security Advisory: Kommander untrusted code execution</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 06:18:02 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T06:18:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 06:48:56 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T06:48:56Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-24.xml b/glsa-200504-24.xml
index 1eb0943a..e7bd5d80 100644
--- a/glsa-200504-24.xml
+++ b/glsa-200504-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-24">
<title>eGroupWare: XSS and SQL injection vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) vulnerabilities.
</synopsis>
<product type="ebuild">eGroupWare</product>
- <announced>April 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89517</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.0.0.007&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.0.0.007"</code>
</resolution>
<references>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00069-04202005">GulfTech Security Research Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1202">CVE-2005-1202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1203">CVE-2005-1203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1202">CVE-2005-1202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1203">CVE-2005-1203</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Apr 2005 09:15:46 +0000">
+ <metadata tag="requester" timestamp="2005-04-23T09:15:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Apr 2005 18:41:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-24T18:41:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Apr 2005 09:36:49 +0000">
+ <metadata tag="submitter" timestamp="2005-04-25T09:36:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200504-25.xml b/glsa-200504-25.xml
index 5fe87837..80a6f316 100644
--- a/glsa-200504-25.xml
+++ b/glsa-200504-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-25">
<title>Rootkit Hunter: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">rkhunter</product>
- <announced>April 26, 2005</announced>
- <revised>April 26, 2005: 01</revised>
+ <announced>2005-04-26</announced>
+ <revised>2005-04-26: 01</revised>
<bug>90007</bug>
<access>local</access>
<affected>
@@ -54,15 +53,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-forensics/rkhunter-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-forensics/rkhunter-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1270">CAN-2005-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1270">CAN-2005-1270</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2005 06:10:01 +0000">
+ <metadata tag="submitter" timestamp="2005-04-26T06:10:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Apr 2005 18:37:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-26T18:37:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-26.xml b/glsa-200504-26.xml
index 68327d57..e1417c43 100644
--- a/glsa-200504-26.xml
+++ b/glsa-200504-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-26">
<title>Convert-UUlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Convert-UUlib</product>
- <announced>April 26, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89501</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Convert-UUlib-1.051&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Convert-UUlib-1.051"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349">CVE-2005-1349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349">CVE-2005-1349</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Apr 2005 16:17:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-19T16:17:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Apr 2005 08:24:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-21T08:24:58Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Apr 2005 20:37:01 +0000">
+ <metadata tag="submitter" timestamp="2005-04-25T20:37:01Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200504-27.xml b/glsa-200504-27.xml
index d5edd70a..d42f1721 100644
--- a/glsa-200504-27.xml
+++ b/glsa-200504-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-27">
<title>xine-lib: Two heap overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 26, 2005</announced>
- <revised>April 26, 2005: 01</revised>
+ <announced>2005-04-26</announced>
+ <revised>2005-04-26: 01</revised>
<bug>89976</bug>
<access>remote</access>
<affected>
@@ -55,10 +54,10 @@
<references>
<uri link="http://xinehq.de/index.php/security/XSA-2004-8">Xine Advisory XSA-2004-8</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 08:22:32 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T08:22:32Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Apr 2005 20:44:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-26T20:44:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-28.xml b/glsa-200504-28.xml
index 5612743e..6b7deab6 100644
--- a/glsa-200504-28.xml
+++ b/glsa-200504-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-28">
<title>Heimdal: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Heimdal which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>April 28, 2005</announced>
- <revised>April 28, 2005: 01</revised>
+ <announced>2005-04-28</announced>
+ <revised>2005-04-28: 01</revised>
<bug>89861</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2005 20:42:17 +0000">
+ <metadata tag="requester" timestamp="2005-04-26T20:42:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Apr 2005 00:18:43 +0000">
+ <metadata tag="submitter" timestamp="2005-04-27T00:18:43Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Apr 2005 08:35:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-28T08:35:57Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200504-29.xml b/glsa-200504-29.xml
index 37d82560..4ca8cd27 100644
--- a/glsa-200504-29.xml
+++ b/glsa-200504-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-29">
<title>Pound: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Pound</product>
- <announced>April 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>90851</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/pound-1.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/pound-1.8.3"</code>
</resolution>
<references>
<uri link="http://www.apsis.ch/pound/pound_list/archive/2005/2005-04/1114516112000">Original announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1391">CVE-2005-1391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1391">CVE-2005-1391</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 17:01:33 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T17:01:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Apr 2005 20:39:56 +0000">
+ <metadata tag="submitter" timestamp="2005-04-29T20:39:56Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Apr 2005 08:11:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-30T08:11:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200504-30.xml b/glsa-200504-30.xml
index 808ef3da..22aa6ae9 100644
--- a/glsa-200504-30.xml
+++ b/glsa-200504-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-30">
<title>phpMyAdmin: Insecure SQL script installation</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to a database compromise.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>April 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88831</bug>
<access>local</access>
<affected>
@@ -59,15 +58,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1392">CVE-2005-1392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1392">CVE-2005-1392</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 29 Apr 2005 08:17:12 +0000">
+ <metadata tag="submitter" timestamp="2005-04-29T08:17:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Apr 2005 18:24:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-29T18:24:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-01.xml b/glsa-200505-01.xml
index a801e6bf..a6ed7a6a 100644
--- a/glsa-200505-01.xml
+++ b/glsa-200505-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-01">
<title>Horde Framework: Multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cross-site scripting (XSS) vulnerabilities.
</synopsis>
<product type="ebuild">Horde</product>
- <announced>May 01, 2005</announced>
- <revised>May 01, 2005: 01</revised>
+ <announced>2005-05-01</announced>
+ <revised>2005-05-01: 01</revised>
<bug>90365</bug>
<access>remote</access>
<affected>
@@ -88,78 +87,78 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-2.2.8"</code>
<p>
All Horde Vacation users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-vacation-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-vacation-2.2.2"</code>
<p>
All Horde Turba users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-turba-1.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-turba-1.2.5"</code>
<p>
All Horde Passwd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-passwd-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-passwd-2.2.2"</code>
<p>
All Horde Nag users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-nag-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-nag-1.1.3"</code>
<p>
All Horde Mnemo users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-mnemo-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-mnemo-1.1.4"</code>
<p>
All Horde Kronolith users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-1.1.4"</code>
<p>
All Horde IMP users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-3.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-3.2.8"</code>
<p>
All Horde Accounts users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-accounts-2.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-accounts-2.1.2"</code>
<p>
All Horde Forwards users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-forwards-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-forwards-2.2.2"</code>
<p>
All Horde Chora users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-chora-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-chora-1.2.3"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=horde-announce&amp;r=1&amp;b=200504&amp;w=2">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 18:22:59 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T18:22:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Apr 2005 18:24:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-29T18:24:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Apr 2005 20:44:12 +0000">
+ <metadata tag="submitter" timestamp="2005-04-30T20:44:12Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200505-02.xml b/glsa-200505-02.xml
index 4bf8fac4..2c0cb114 100644
--- a/glsa-200505-02.xml
+++ b/glsa-200505-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-02">
<title>Oops!: Remote code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">oops</product>
- <announced>May 05, 2005</announced>
- <revised>May 05, 2005: 02</revised>
+ <announced>2005-05-05</announced>
+ <revised>2005-05-05: 02</revised>
<bug>91303</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/oops-1.5.24_pre20050503&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/oops-1.5.24_pre20050503"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1121">CAN-2005-1121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1121">CAN-2005-1121</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 May 2005 15:38:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-04T15:38:53Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 04 May 2005 15:39:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-04T15:39:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 13:38:44 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T13:38:44Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200505-03.xml b/glsa-200505-03.xml
index 5dd76997..61e7b9c6 100644
--- a/glsa-200505-03.xml
+++ b/glsa-200505-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-03">
<title>Ethereal: Numerous vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>May 06, 2005</announced>
- <revised>May 06, 2005: 01</revised>
+ <announced>2005-05-06</announced>
+ <revised>2005-05-06: 01</revised>
<bug>90539</bug>
<access>remote</access>
<affected>
@@ -72,30 +71,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.11"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00019.html">Ethereal enpa-sa-00019</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1456">CAN-2005-1456</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1457">CAN-2005-1457</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1458">CAN-2005-1458</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1459">CAN-2005-1459</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1460">CAN-2005-1460</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1461">CAN-2005-1461</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1462">CAN-2005-1462</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1463">CAN-2005-1463</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1464">CAN-2005-1464</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1465">CAN-2005-1465</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1466">CAN-2005-1466</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1467">CAN-2005-1467</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1468">CAN-2005-1468</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1469">CAN-2005-1469</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1470">CAN-2005-1470</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1456">CAN-2005-1456</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1457">CAN-2005-1457</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1458">CAN-2005-1458</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1459">CAN-2005-1459</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1460">CAN-2005-1460</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1461">CAN-2005-1461</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1462">CAN-2005-1462</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1463">CAN-2005-1463</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1464">CAN-2005-1464</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1465">CAN-2005-1465</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1466">CAN-2005-1466</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1467">CAN-2005-1467</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1468">CAN-2005-1468</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1469">CAN-2005-1469</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1470">CAN-2005-1470</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 19:56:33 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T19:56:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 May 2005 17:24:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-06T17:24:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-04.xml b/glsa-200505-04.xml
index 19056a1b..68bd0df3 100644
--- a/glsa-200505-04.xml
+++ b/glsa-200505-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-04">
<title>GnuTLS: Denial of Service vulnerability</title>
<synopsis>
The GnuTLS library is vulnerable to Denial of Service attacks.
</synopsis>
<product type="ebuild">GnuTLS</product>
- <announced>May 09, 2005</announced>
- <revised>May 09, 2005: 01</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-05-09: 01</revised>
<bug>90726</bug>
<access>remote</access>
<affected>
@@ -67,15 +66,15 @@
</resolution>
<references>
<uri link="http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html">GnuTLS Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431">CAN-2005-1431</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431">CAN-2005-1431</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 18:20:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T18:20:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Apr 2005 14:44:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-30T14:44:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Apr 2005 16:35:11 +0000">
+ <metadata tag="submitter" timestamp="2005-04-30T16:35:11Z">
lewk
</metadata>
</glsa>
diff --git a/glsa-200505-05.xml b/glsa-200505-05.xml
index 097a4110..eb08e9bc 100644
--- a/glsa-200505-05.xml
+++ b/glsa-200505-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-05">
<title>gzip: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary commands.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>May 09, 2005</announced>
- <revised>May 09, 2005: 01</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-05-09: 01</revised>
<bug>89946</bug>
<bug>90626</bug>
<access>local</access>
@@ -52,17 +51,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/gzip-1.3.5-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/gzip-1.3.5-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758">CAN-2005-0758</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988">CAN-2005-0988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228">CAN-2005-1228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758">CAN-2005-0758</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988">CAN-2005-0988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228">CAN-2005-1228</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 06 May 2005 19:23:26 +0000">
+ <metadata tag="submitter" timestamp="2005-05-06T19:23:26Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 May 2005 05:30:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-09T05:30:13Z">
r2d2
</metadata>
</glsa>
diff --git a/glsa-200505-06.xml b/glsa-200505-06.xml
index 9fa4462d..dbbb7c14 100644
--- a/glsa-200505-06.xml
+++ b/glsa-200505-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-06">
<title>TCPDump: Decoding routines Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service attack.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>May 09, 2005</announced>
- <revised>June 12, 2005: 02</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-06-12: 02</revised>
<bug>90541</bug>
<bug>95349</bug>
<access>remote</access>
@@ -50,21 +49,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/tcpdump-3.8.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/tcpdump-3.8.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1267">CAN-2005-1267</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1278">CAN-2005-1278</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279">CAN-2005-1279</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280">CAN-2005-1280</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1267">CAN-2005-1267</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1278">CAN-2005-1278</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279">CAN-2005-1279</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280">CAN-2005-1280</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 May 2005 15:18:02 +0000">
+ <metadata tag="requester" timestamp="2005-05-08T15:18:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 May 2005 15:56:20 +0000">
+ <metadata tag="submitter" timestamp="2005-05-08T15:56:20Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 May 2005 19:22:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-09T19:22:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-07.xml b/glsa-200505-07.xml
index 2d5b9be1..2a98ed3e 100644
--- a/glsa-200505-07.xml
+++ b/glsa-200505-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-07">
<title>libTIFF: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>May 10, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91584</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.7.2"</code>
</resolution>
<references>
<uri link="http://bugzilla.remotesensing.org/show_bug.cgi?id=843">LIBTIFF BUG#863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544">CVE-2005-1544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544">CVE-2005-1544</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 May 2005 18:55:28 +0000">
+ <metadata tag="submitter" timestamp="2005-05-09T18:55:28Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 May 2005 20:03:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-10T20:03:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-08.xml b/glsa-200505-08.xml
index 019696bf..61cbd1b8 100644
--- a/glsa-200505-08.xml
+++ b/glsa-200505-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-08">
<title>HT Editor: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">hteditor</product>
- <announced>May 10, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91569</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/hteditor-0.8.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/hteditor-0.8.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545">CVE-2005-1545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546">CVE-2005-1546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545">CVE-2005-1545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546">CVE-2005-1546</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 May 2005 15:16:28 +0000">
+ <metadata tag="requester" timestamp="2005-05-05T15:16:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 17:28:17 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T17:28:17Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 May 2005 20:04:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-10T20:04:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-09.xml b/glsa-200505-09.xml
index 7ad29733..b59b136f 100644
--- a/glsa-200505-09.xml
+++ b/glsa-200505-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-09">
<title>Gaim: Denial of Service and buffer overflow vulnerabilties</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>May 12, 2005</announced>
- <revised>May 12, 2005: 01</revised>
+ <announced>2005-05-12</announced>
+ <revised>2005-05-12: 01</revised>
<bug>91862</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1261">CAN-2005-1261</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1262">CAN-2005-1262</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1261">CAN-2005-1261</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1262">CAN-2005-1262</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 May 2005 11:51:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-11T11:51:15Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 May 2005 04:18:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-12T04:18:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-10.xml b/glsa-200505-10.xml
index 8496d94a..4dfee549 100644
--- a/glsa-200505-10.xml
+++ b/glsa-200505-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-10">
<title>phpBB: Cross-Site Scripting Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary scripting code execution.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>May 14, 2005</announced>
- <revised>May 14, 2005: 01</revised>
+ <announced>2005-05-14</announced>
+ <revised>2005-05-14: 01</revised>
<bug>90213</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
emerge --sync
- emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpBB-2.0.15&quot;</code>
+ emerge --ask --oneshot --verbose "&gt;=www-apps/phpBB-2.0.15"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13344/info/">BugTraq ID 13344</uri>
<uri link="http://securitytracker.com/id?1013918">SecurityTracker ID 1013918</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 May 2005 08:29:22 +0000">
+ <metadata tag="requester" timestamp="2005-05-13T08:29:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 May 2005 08:29:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-13T08:29:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 May 2005 19:13:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-13T19:13:15Z">
r2d2
</metadata>
</glsa>
diff --git a/glsa-200505-11.xml b/glsa-200505-11.xml
index 6824b7fd..ab29551f 100644
--- a/glsa-200505-11.xml
+++ b/glsa-200505-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-11">
<title>Mozilla Suite, Mozilla Firefox: Remote compromise</title>
<synopsis>
@@ -8,8 +7,8 @@
to conduct cross-site scripting attacks or to execute arbitrary code.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>May 15, 2005</announced>
- <revised>May 15, 2005: 01</revised>
+ <announced>2005-05-15</announced>
+ <revised>2005-05-15: 01</revised>
<bug>91859</bug>
<bug>92393</bug>
<bug>92394</bug>
@@ -77,40 +76,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.4"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.8"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1476">CAN-2005-1476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1477">CAN-2005-1477</uri>
- <uri link="http://www.mozilla.org/security/announce/mfsa2005-43.html">Mozilla Foundation Security Advisory 2005-43</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1476">CAN-2005-1476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1477">CAN-2005-1477</uri>
+ <uri link="https://www.mozilla.org/security/announce/mfsa2005-43.html">Mozilla Foundation Security Advisory 2005-43</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 May 2005 04:49:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-12T04:49:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 08:27:49 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T08:27:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 May 2005 08:10:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-15T08:10:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-12.xml b/glsa-200505-12.xml
index 57b3e952..91c7fbe1 100644
--- a/glsa-200505-12.xml
+++ b/glsa-200505-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-12">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
unprivileged users to gain administrator rights.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>May 15, 2005</announced>
- <revised>June 26, 2007: 04</revised>
+ <announced>2005-05-15</announced>
+ <revised>2007-06-26: 04</revised>
<bug>91231</bug>
<access>remote</access>
<affected>
@@ -55,8 +54,7 @@
<resolution>
<p>
All PostgreSQL users should update to the latest available version and
- follow the guide at <uri
- link="http://www.postgresql.org/about/news.315">http://www.postgresql.o
+ follow the guide at <uri link="http://www.postgresql.org/about/news.315">http://www.postgresql.o
rg/about/news.315</uri>
</p>
@@ -65,14 +63,14 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1409">CAN-2005-1409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1410">CAN-2005-1410</uri>
- <uri link="http://www.postgresql.org/about/news.315">PostgreSQL Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1409">CAN-2005-1409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1410">CAN-2005-1410</uri>
+ <uri link="https://www.postgresql.org/about/news.315">PostgreSQL Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 May 2005 15:07:25 +0000">
+ <metadata tag="submitter" timestamp="2005-05-11T15:07:25Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 May 2005 09:19:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-15T09:19:16Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-13.xml b/glsa-200505-13.xml
index 7c630928..9d5733e8 100644
--- a/glsa-200505-13.xml
+++ b/glsa-200505-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-13">
<title>FreeRADIUS: SQL injection and Denial of Service vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>May 17, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-05-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>91736</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.0.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.0.2-r4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13540/">BugTraq ID 13540</uri>
<uri link="http://www.securityfocus.com/bid/13541/">BugTraq ID 13541</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454">CVE-2005-1454</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455">CVE-2005-1455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454">CVE-2005-1454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455">CVE-2005-1455</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 May 2005 12:54:33 +0000">
+ <metadata tag="requester" timestamp="2005-05-12T12:54:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 13:46:19 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T13:46:19Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 May 2005 13:01:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-17T13:01:45Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-14.xml b/glsa-200505-14.xml
index 36d0bf44..0f944211 100644
--- a/glsa-200505-14.xml
+++ b/glsa-200505-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-14">
<title>Cheetah: Untrusted module search path</title>
<synopsis>
@@ -8,8 +7,8 @@
allow a local user to gain escalated privileges.
</synopsis>
<product type="ebuild">Cheetah</product>
- <announced>May 19, 2005</announced>
- <revised>May 17, 2006: 02</revised>
+ <announced>2005-05-19</announced>
+ <revised>2006-05-17: 02</revised>
<bug>92926</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cheetah-0.9.17_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cheetah-0.9.17_rc1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/15386/">Secunia Advisory SA15386</uri>
+ <uri link="https://secunia.com/advisories/15386/">Secunia Advisory SA15386</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 May 2005 21:18:59 +0000">
+ <metadata tag="requester" timestamp="2005-05-17T21:18:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 May 2005 21:38:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-17T21:38:15Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 May 2005 11:47:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-18T11:47:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-15.xml b/glsa-200505-15.xml
index da2e894f..14bea9a7 100644
--- a/glsa-200505-15.xml
+++ b/glsa-200505-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-15">
<title>gdb: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">gdb</product>
- <announced>May 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88398</bug>
<bug>91398</bug>
<bug>91654</bug>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/gdb-6.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/gdb-6.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705">CVE-2005-1705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705">CVE-2005-1705</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 May 2005 21:52:10 +0000">
+ <metadata tag="requester" timestamp="2005-05-06T21:52:10Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 May 2005 04:11:43 +0000">
+ <metadata tag="submitter" timestamp="2005-05-07T04:11:43Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 May 2005 12:36:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-20T12:36:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-16.xml b/glsa-200505-16.xml
index 94ee3b47..8275d535 100644
--- a/glsa-200505-16.xml
+++ b/glsa-200505-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-16">
<title>ImageMagick, GraphicsMagick: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>May 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>90423</bug>
<bug>90595</bug>
<access>remote</access>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.2.3"</code>
<p>
All GraphicsMagick users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739">CVE-2005-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739">CVE-2005-1739</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 May 2005 05:18:30 +0000">
+ <metadata tag="requester" timestamp="2005-05-04T05:18:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 19:34:27 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T19:34:27Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 May 2005 14:59:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-21T14:59:55Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-17.xml b/glsa-200505-17.xml
index cc6b5908..81cbb9fd 100644
--- a/glsa-200505-17.xml
+++ b/glsa-200505-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-17">
<title>Qpopper: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files and create files with insecure permissions.
</synopsis>
<product type="ebuild">qpopper</product>
- <announced>May 23, 2005</announced>
- <revised>May 23, 2005: 01</revised>
+ <announced>2005-05-23</announced>
+ <revised>2005-05-23: 01</revised>
<bug>90622</bug>
<access>local</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/qpopper-4.0.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/qpopper-4.0.5-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1151">CAN-2005-1151</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1152">CAN-2005-1152</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1151">CAN-2005-1151</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1152">CAN-2005-1152</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 10 May 2005 16:31:30 +0000">
+ <metadata tag="submitter" timestamp="2005-05-10T16:31:30Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 May 2005 19:25:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-23T19:25:37Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200505-18.xml b/glsa-200505-18.xml
index adb4d75a..293a82c1 100644
--- a/glsa-200505-18.xml
+++ b/glsa-200505-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-18">
<title>Net-SNMP: fixproc insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>May 23, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91792</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.2.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1740">CVE-2005-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1740">CVE-2005-1740</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 May 2005 14:27:59 +0000">
+ <metadata tag="requester" timestamp="2005-05-22T14:27:59Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 May 2005 15:33:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-22T15:33:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 May 2005 23:22:24 +0000">
+ <metadata tag="submitter" timestamp="2005-05-22T23:22:24Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200505-19.xml b/glsa-200505-19.xml
index 6aae76c0..401b23b4 100644
--- a/glsa-200505-19.xml
+++ b/glsa-200505-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-19">
<title>gxine: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">gxine</product>
- <announced>May 26, 2005</announced>
- <revised>May 26, 2005: 01</revised>
+ <announced>2005-05-26</announced>
+ <revised>2005-05-26: 01</revised>
<bug>93532</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
# emerge --ask --oneshot --verbose media-video/gxine</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1692">CAN-2005-1692</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1692">CAN-2005-1692</uri>
<uri link="http://www.securityfocus.com/bid/13707">Bugtraq ID 13707</uri>
<uri link="http://www.0xbadexworm.org/adv/gxinefmt.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 May 2005 14:37:48 +0000">
+ <metadata tag="submitter" timestamp="2005-05-24T14:37:48Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 May 2005 11:13:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-26T11:13:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200505-20.xml b/glsa-200505-20.xml
index d02c849e..c5ac4079 100644
--- a/glsa-200505-20.xml
+++ b/glsa-200505-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-20">
<title>Mailutils: Multiple vulnerabilities in imap4d and mail</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>May 27, 2005</announced>
- <revised>May 27, 2005: 01</revised>
+ <announced>2005-05-27</announced>
+ <revised>2005-05-27: 01</revised>
<bug>94053</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1520">CAN-2005-1520</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1521">CAN-2005-1521</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1522">CAN-2005-1522</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1523">CAN-2005-1523</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1520">CAN-2005-1520</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1521">CAN-2005-1521</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1522">CAN-2005-1522</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1523">CAN-2005-1523</uri>
<uri link="http://www.idefense.com/application/poi/display?type=vulnerabilities&amp;showYear=2005">iDEFENSE 05.25.05 advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 May 2005 13:21:14 +0000">
+ <metadata tag="submitter" timestamp="2005-05-26T13:21:14Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 May 2005 07:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-27T07:50:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-01.xml b/glsa-200506-01.xml
index ad788bef..d6cad10e 100644
--- a/glsa-200506-01.xml
+++ b/glsa-200506-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-01">
<title>Binutils, elfutils: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">binutils</product>
- <announced>June 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91398</bug>
<bug>91817</bug>
<access>remote</access>
@@ -67,15 +66,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/elfutils-0.108&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/elfutils-0.108"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 20:12:23 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T20:12:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 01 Jun 2005 15:04:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-01T15:04:54Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-02.xml b/glsa-200506-02.xml
index 0d85c6d0..2a01aca0 100644
--- a/glsa-200506-02.xml
+++ b/glsa-200506-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-02">
<title>Mailutils: SQL Injection</title>
<synopsis>
GNU Mailutils is vulnerable to SQL command injection attacks.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>June 06, 2005</announced>
- <revised>June 06, 2005: 01</revised>
+ <announced>2005-06-06</announced>
+ <revised>2005-06-06: 01</revised>
<bug>94824</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824">CAN-2005-1824</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824">CAN-2005-1824</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Jun 2005 13:35:06 +0000">
+ <metadata tag="requester" timestamp="2005-06-05T13:35:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2005 17:42:35 +0000">
+ <metadata tag="submitter" timestamp="2005-06-05T17:42:35Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Jun 2005 11:45:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-06T11:45:10Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-03.xml b/glsa-200506-03.xml
index 36a4e8e4..3a571124 100644
--- a/glsa-200506-03.xml
+++ b/glsa-200506-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-03">
<title>Dzip: Directory traversal vulnerability</title>
<synopsis>
Dzip is vulnerable to a directory traversal attack.
</synopsis>
<product type="ebuild">dzip</product>
- <announced>June 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93079</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-utils/dzip-2.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-utils/dzip-2.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1874">CVE-2005-1874</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1874">CVE-2005-1874</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 May 2005 13:58:23 +0000">
+ <metadata tag="requester" timestamp="2005-05-30T13:58:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 May 2005 13:59:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-30T13:59:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2005 17:58:43 +0000">
+ <metadata tag="submitter" timestamp="2005-06-05T17:58:43Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200506-04.xml b/glsa-200506-04.xml
index afa084d9..2d4f938e 100644
--- a/glsa-200506-04.xml
+++ b/glsa-200506-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-04">
<title>Wordpress: Multiple vulnerabilities</title>
<synopsis>
Wordpress contains SQL injection and XSS vulnerabilities.
</synopsis>
<product type="ebuild">Wordpress</product>
- <announced>June 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88926</bug>
<bug>94512</bug>
<access>remote</access>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.5.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.5.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1102">CVE-2005-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687">CVE-2005-1687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810">CVE-2005-1810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1102">CVE-2005-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687">CVE-2005-1687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810">CVE-2005-1810</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Jun 2005 07:49:47 +0000">
+ <metadata tag="requester" timestamp="2005-06-01T07:49:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 01 Jun 2005 07:49:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-01T07:49:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jun 2005 05:09:09 +0000">
+ <metadata tag="submitter" timestamp="2005-06-06T05:09:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200506-05.xml b/glsa-200506-05.xml
index 9e88bb7f..1899fbfa 100644
--- a/glsa-200506-05.xml
+++ b/glsa-200506-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-05">
<title>SilverCity: Insecure file permissions</title>
<synopsis>
@@ -8,8 +7,8 @@
unsuspecting user to run arbitrary code.
</synopsis>
<product type="ebuild">silvercity</product>
- <announced>June 08, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-08</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93558</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/silvercity-0.9.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/silvercity-0.9.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1941">CVE-2005-1941</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1941">CVE-2005-1941</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jun 2005 18:24:23 +0000">
+ <metadata tag="requester" timestamp="2005-06-06T18:24:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Jun 2005 18:24:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-06T18:24:47Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jun 2005 01:08:04 +0000">
+ <metadata tag="submitter" timestamp="2005-06-07T01:08:04Z">
r2d2
</metadata>
</glsa>
diff --git a/glsa-200506-06.xml b/glsa-200506-06.xml
index cf23d455..571b3df8 100644
--- a/glsa-200506-06.xml
+++ b/glsa-200506-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-06">
<title>libextractor: Multiple overflow vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libextractor</product>
- <announced>June 09, 2005</announced>
- <revised>June 09, 2005: 01</revised>
+ <announced>2005-06-09</announced>
+ <revised>2005-06-09: 01</revised>
<bug>79704</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
- <uri link="http://gnunet.org/libextractor/">libextractor security announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://gnunet.org/libextractor/">libextractor security announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 1 Mar 2005 11:13:31 +0000">
+ <metadata tag="requester" timestamp="2005-03-01T11:13:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 15:44:04 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T15:44:04Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Jun 2005 11:34:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-08T11:34:48Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-07.xml b/glsa-200506-07.xml
index b74ef01d..b13e0f38 100644
--- a/glsa-200506-07.xml
+++ b/glsa-200506-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-07">
<title>Ettercap: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>94474</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ettercap-0.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ettercap-0.7.3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1796">CAN-2005-1796</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1796">CAN-2005-1796</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Jun 2005 08:05:23 +0000">
+ <metadata tag="requester" timestamp="2005-06-08T08:05:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Jun 2005 16:01:35 +0000">
+ <metadata tag="submitter" timestamp="2005-06-08T16:01:35Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jun 2005 08:22:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-11T08:22:41Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-08.xml b/glsa-200506-08.xml
index 4bb6a654..db6d5a8b 100644
--- a/glsa-200506-08.xml
+++ b/glsa-200506-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-08">
<title>GNU shtool, ocaml-mysql: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">GNU shtool</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>93782</bug>
<bug>93784</bug>
<access>local</access>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/shtool-2.0.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/shtool-2.0.1-r2"</code>
<p>
All ocaml-mysql users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ml/ocaml-mysql-1.0.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ml/ocaml-mysql-1.0.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751">CAN-2005-1751</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759">CAN-2005-1759</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751">CAN-2005-1751</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759">CAN-2005-1759</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 27 May 2005 16:05:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-27T16:05:53Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 28 May 2005 21:16:10 +0000">
+ <metadata tag="submitter" timestamp="2005-05-28T21:16:10Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 15:51:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T15:51:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-09.xml b/glsa-200506-09.xml
index fd359ad1..4a3e3991 100644
--- a/glsa-200506-09.xml
+++ b/glsa-200506-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-09">
<title>gedit: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">gedit</product>
- <announced>June 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93352</bug>
<access>remote</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.10.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.10.3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13699">BugTraq ID 13699</uri>
- <uri link="http://mail.gnome.org/archives/gnome-announce-list/2005-June/msg00006.html">gedit 10.3 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686">CVE-2005-1686</uri>
+ <uri link="https://mail.gnome.org/archives/gnome-announce-list/2005-June/msg00006.html">gedit 10.3 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686">CVE-2005-1686</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 14:36:10 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T14:36:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 17:36:40 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T17:36:40Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jun 2005 11:59:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-11T11:59:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-10.xml b/glsa-200506-10.xml
index f7910c4f..17f422ad 100644
--- a/glsa-200506-10.xml
+++ b/glsa-200506-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-10">
<title>LutelWall: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">LutelWall</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>95378</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/lutelwall-0.98&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/lutelwall-0.98"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1879">CAN-2005-1879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1879">CAN-2005-1879</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 12:14:36 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T12:14:36Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 13:37:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T13:37:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 15:27:13 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T15:27:13Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200506-11.xml b/glsa-200506-11.xml
index 76f87c67..519b821f 100644
--- a/glsa-200506-11.xml
+++ b/glsa-200506-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-11">
<title>Gaim: Denial of Service vulnerabilities</title>
<synopsis>
Gaim contains two remote Denial of Service vulnerabilities.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>June 12, 2005</announced>
- <revised>June 12, 2005: 01</revised>
+ <announced>2005-06-12</announced>
+ <revised>2005-06-12: 01</revised>
<bug>95347</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.3.1"</code>
</resolution>
<references>
- <uri link="http://gaim.sourceforge.net/security/?id=18">Gaim Vulnerability: Remote Yahoo! crash</uri>
- <uri link="http://gaim.sourceforge.net/security/?id=19">Gaim Vulnerability: MSN Remote DoS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269">CAN-2005-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934">CAN-2005-1934</uri>
+ <uri link="https://gaim.sourceforge.net/security/?id=18">Gaim Vulnerability: Remote Yahoo! crash</uri>
+ <uri link="https://gaim.sourceforge.net/security/?id=19">Gaim Vulnerability: MSN Remote DoS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269">CAN-2005-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934">CAN-2005-1934</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 08:03:05 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T08:03:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 08:44:05 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T08:44:05Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jun 2005 13:55:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-12T13:55:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-12.xml b/glsa-200506-12.xml
index e26f0aa3..101daac7 100644
--- a/glsa-200506-12.xml
+++ b/glsa-200506-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-12">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary scripting code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>June 13, 2005</announced>
- <revised>June 13, 2005: 01</revised>
+ <announced>2005-06-13</announced>
+ <revised>2005-06-13: 01</revised>
<bug>95255</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --ask --oneshot --verbose www-apps/mediawiki</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=332231">MediaWiki 1.4.5 Release Notes</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=332231">MediaWiki 1.4.5 Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 11:34:01 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T11:34:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 11:34:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T11:34:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jun 2005 12:24:08 +0000">
+ <metadata tag="submitter" timestamp="2005-06-11T12:24:08Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200506-13.xml b/glsa-200506-13.xml
index 9f50360e..51f1cdcd 100644
--- a/glsa-200506-13.xml
+++ b/glsa-200506-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-13">
<title>webapp-config: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
commands.
</synopsis>
<product type="ebuild">webapp-config</product>
- <announced>June 17, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-06-17</announced>
+ <revised>2007-12-30: 03</revised>
<bug>91785</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webapp-config-1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webapp-config-1.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1707">CVE-2005-1707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1707">CVE-2005-1707</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 May 2005 15:08:15 +0000">
+ <metadata tag="requester" timestamp="2005-05-10T15:08:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 May 2005 15:49:46 +0000">
+ <metadata tag="submitter" timestamp="2005-05-10T15:49:46Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jun 2005 08:32:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-17T08:32:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-14.xml b/glsa-200506-14.xml
index 3557bde7..fda4b5bd 100644
--- a/glsa-200506-14.xml
+++ b/glsa-200506-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-14">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
their privileges.
</synopsis>
<product type="ebuild">sun-jdk sun-jre-bin blackdown-jre blackdown-jdk</product>
- <announced>June 19, 2005</announced>
- <revised>June 19, 2005: 01</revised>
+ <announced>2005-06-19</announced>
+ <revised>2005-06-19: 01</revised>
<bug>96092</bug>
<bug>96229</bug>
<access>remote</access>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.08"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.08"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.02"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.02"</code>
<p>
Note to SPARC users: There is no stable secure Blackdown Java
for the SPARC architecture. Affected users should remove the package
@@ -91,13 +90,13 @@
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101749-1">Sun Security Alert ID 101749</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-02.txt">Blackdown Java Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jun 2005 16:05:50 +0000">
+ <metadata tag="requester" timestamp="2005-06-16T16:05:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jun 2005 17:03:44 +0000">
+ <metadata tag="submitter" timestamp="2005-06-16T17:03:44Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jun 2005 10:34:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-17T10:34:14Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-15.xml b/glsa-200506-15.xml
index dd92091f..a0d187bd 100644
--- a/glsa-200506-15.xml
+++ b/glsa-200506-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-15">
<title>PeerCast: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>June 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96199</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1212&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1212"</code>
</resolution>
<references>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00077-05282005">GulfTech Advisory</uri>
<uri link="http://www.peercast.org/forum/viewtopic.php?p=11596">PeerCast Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1806">CVE-2005-1806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1806">CVE-2005-1806</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Jun 2005 19:02:57 +0000">
+ <metadata tag="requester" timestamp="2005-06-15T19:02:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Jun 2005 19:42:18 +0000">
+ <metadata tag="submitter" timestamp="2005-06-15T19:42:18Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jun 2005 19:09:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-19T19:09:07Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-16.xml b/glsa-200506-16.xml
index 4c0f246b..63ade67a 100644
--- a/glsa-200506-16.xml
+++ b/glsa-200506-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-16">
<title>cpio: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
extract files to an arbitrary directory.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>June 20, 2005</announced>
- <revised>June 20, 2005: 01</revised>
+ <announced>2005-06-20</announced>
+ <revised>2005-06-20: 01</revised>
<bug>90619</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/cpio-2.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/cpio-2.6-r3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/396429">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111">CAN-2005-1111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111">CAN-2005-1111</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 May 2005 21:22:45 +0000">
+ <metadata tag="requester" timestamp="2005-05-03T21:22:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 15:24:08 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T15:24:08Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jun 2005 20:39:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-19T20:39:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200506-17.xml b/glsa-200506-17.xml
index 70de5953..7658fd3a 100644
--- a/glsa-200506-17.xml
+++ b/glsa-200506-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-17">
<title>SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
when handling certain malformed messages.
</synopsis>
<product type="ebuild">SpamAssassin, Vipul's Razor</product>
- <announced>June 21, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-06-21</announced>
+ <revised>2006-05-22: 03</revised>
<bug>94722</bug>
<bug>95492</bug>
<bug>96776</bug>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.0.4"</code>
<p>
All Vipul's Razor users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/razor-2.74&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/razor-2.74"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266">CAN-2005-1266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2024">CVE-2005-2024</uri>
- <uri link="http://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288@proton.pathname.com%3e">SpamAssassin Announcement</uri>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=7520323&amp;forum_id=4259">Vipul's Razor Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266">CAN-2005-1266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2024">CVE-2005-2024</uri>
+ <uri link="https://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288@proton.pathname.com%3e">SpamAssassin Announcement</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=7520323&amp;forum_id=4259">Vipul's Razor Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Jun 2005 05:05:05 +0000">
+ <metadata tag="submitter" timestamp="2005-06-08T05:05:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Jun 2005 04:49:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-20T04:49:42Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200506-18.xml b/glsa-200506-18.xml
index 4d105d99..f376b99a 100644
--- a/glsa-200506-18.xml
+++ b/glsa-200506-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-18">
<title>Tor: Information disclosure</title>
<synopsis>
A flaw in Tor may allow the disclosure of arbitrary memory portions.
</synopsis>
<product type="ebuild">tor</product>
- <announced>June 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96320</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.0.9.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.0.9.10"</code>
</resolution>
<references>
<uri link="http://archives.seul.org/or/announce/Jun-2005/msg00001.html">Tor Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2050">CVE-2005-2050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2050">CVE-2005-2050</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Jun 2005 07:51:28 +0000">
+ <metadata tag="requester" timestamp="2005-06-20T07:51:28Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jun 2005 13:31:02 +0000">
+ <metadata tag="submitter" timestamp="2005-06-20T13:31:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Jun 2005 08:50:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-21T08:50:44Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-19.xml b/glsa-200506-19.xml
index 7735e3d0..a8ca7c38 100644
--- a/glsa-200506-19.xml
+++ b/glsa-200506-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-19">
<title>SquirrelMail: Several XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to a compromise of webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>June 21, 2005</announced>
- <revised>June 21, 2005: 01</revised>
+ <announced>2005-06-21</announced>
+ <revised>2005-06-21: 01</revised>
<bug>95937</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.4"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.squirrelmail.org/security/issue/2005-06-15">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769">CAN-2005-1769</uri>
+ <uri link="https://www.squirrelmail.org/security/issue/2005-06-15">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769">CAN-2005-1769</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 19 Jun 2005 19:26:13 +0000">
+ <metadata tag="submitter" timestamp="2005-06-19T19:26:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Jun 2005 17:48:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-20T17:48:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-20.xml b/glsa-200506-20.xml
index a4291aae..9ba37993 100644
--- a/glsa-200506-20.xml
+++ b/glsa-200506-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-20">
<title>Cacti: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
file inclusion vulnerabilities.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>June 22, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-06-22</announced>
+ <revised>2006-05-22: 03</revised>
<bug>96243</bug>
<bug>97475</bug>
<access>remote</access>
@@ -52,29 +51,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6f"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.cacti.net/release_notes_0_8_6e.php">Cacti Release Notes - 0.8.6e</uri>
+ <uri link="https://www.cacti.net/release_notes_0_8_6e.php">Cacti Release Notes - 0.8.6e</uri>
<uri link="http://www.idefense.com/application/poi/display?id=267&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE SQL injection advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=266&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE config_settings advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=265&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE remote file inclusion advisory</uri>
- <uri link="http://www.cacti.net/release_notes_0_8_6f.php">Cacti Release Notes - 0.8.6f</uri>
- <uri link="http://www.hardened-php.net/advisory-032005.php">Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities</uri>
- <uri link="http://www.hardened-php.net/advisory-042005.php">Hardened - PHP Project Cacti Remote Command Execution Vulnerability</uri>
- <uri link="http://www.hardened-php.net/advisory-052005.php">Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1524">CVE-2005-1524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1525">CVE-2005-1525</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1526">CVE-2005-1526</uri>
+ <uri link="https://www.cacti.net/release_notes_0_8_6f.php">Cacti Release Notes - 0.8.6f</uri>
+ <uri link="https://www.hardened-php.net/advisory-032005.php">Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities</uri>
+ <uri link="https://www.hardened-php.net/advisory-042005.php">Hardened - PHP Project Cacti Remote Command Execution Vulnerability</uri>
+ <uri link="https://www.hardened-php.net/advisory-052005.php">Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1524">CVE-2005-1524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1525">CVE-2005-1525</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1526">CVE-2005-1526</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Jun 2005 20:41:03 +0000">
+ <metadata tag="submitter" timestamp="2005-06-21T20:41:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Jun 2005 08:16:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-22T08:16:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-21.xml b/glsa-200506-21.xml
index b58232f0..9925e20b 100644
--- a/glsa-200506-21.xml
+++ b/glsa-200506-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-21">
<title>Trac: File upload vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">trac</product>
- <announced>June 22, 2005</announced>
- <revised>June 22, 2005: 01</revised>
+ <announced>2005-06-22</announced>
+ <revised>2005-06-22: 01</revised>
<bug>96572</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.8.4"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory-012005.php">Hardened PHP Advisory 012005</uri>
+ <uri link="https://www.hardened-php.net/advisory-012005.php">Hardened PHP Advisory 012005</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2005 20:04:48 +0000">
+ <metadata tag="requester" timestamp="2005-06-21T20:04:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jun 2005 01:36:58 +0000">
+ <metadata tag="submitter" timestamp="2005-06-22T01:36:58Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Jun 2005 08:15:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-22T08:15:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200506-22.xml b/glsa-200506-22.xml
index 0ca9e674..14944b05 100644
--- a/glsa-200506-22.xml
+++ b/glsa-200506-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-22">
<title>sudo: Arbitrary command execution</title>
<synopsis>
A vulnerability in sudo may allow local users to elevate privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 23, 2005</announced>
- <revised>June 23, 2005: 01</revised>
+ <announced>2005-06-23</announced>
+ <revised>2005-06-23: 01</revised>
<bug>96618</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.6.8_p9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.6.8_p9"</code>
</resolution>
<references>
- <uri link="http://www.sudo.ws/sudo/alerts/path_race.html">Sudo Announcement</uri>
+ <uri link="https://www.sudo.ws/sudo/alerts/path_race.html">Sudo Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2005 20:05:11 +0000">
+ <metadata tag="requester" timestamp="2005-06-21T20:05:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jun 2005 15:18:20 +0000">
+ <metadata tag="submitter" timestamp="2005-06-22T15:18:20Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Jun 2005 06:48:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-23T06:48:01Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200506-23.xml b/glsa-200506-23.xml
index 04041a63..2fe85ff8 100644
--- a/glsa-200506-23.xml
+++ b/glsa-200506-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-23">
<title>Clam AntiVirus: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
certain Quantum archives.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>June 27, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96960</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.86.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.86.1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=337279">Clam AntiVirus Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056">CVE-2005-2056</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=337279">Clam AntiVirus Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056">CVE-2005-2056</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Jun 2005 22:27:44 +0000">
+ <metadata tag="requester" timestamp="2005-06-24T22:27:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Jun 2005 23:09:26 +0000">
+ <metadata tag="submitter" timestamp="2005-06-24T23:09:26Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Jun 2005 16:53:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-26T16:53:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200506-24.xml b/glsa-200506-24.xml
index c00864d8..30212927 100644
--- a/glsa-200506-24.xml
+++ b/glsa-200506-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-24">
<title>Heimdal: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>June 29, 2005</announced>
- <revised>June 29, 2005: 01</revised>
+ <announced>2005-06-29</announced>
+ <revised>2005-06-29: 01</revised>
<bug>96727</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.6.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.6.5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2040">CAN-2005-2040</uri>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2005-06-20/">Heimdal Advisory 2005-06-20</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2040">CAN-2005-2040</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2005-06-20/">Heimdal Advisory 2005-06-20</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Jun 2005 11:06:31 +0000">
+ <metadata tag="requester" timestamp="2005-06-23T11:06:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 23 Jun 2005 12:58:46 +0000">
+ <metadata tag="submitter" timestamp="2005-06-23T12:58:46Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Jun 2005 07:29:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-29T07:29:29Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-01.xml b/glsa-200507-01.xml
index 8536d4c6..23ddc877 100644
--- a/glsa-200507-01.xml
+++ b/glsa-200507-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-01">
<title>PEAR XML-RPC, phpxmlrpc: PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP script commands.
</synopsis>
<product type="ebuild">pear-xml_rpc phpxmlrpc</product>
- <announced>July 03, 2005</announced>
- <revised>July 03, 2005: 01</revised>
+ <announced>2005-07-03</announced>
+ <revised>2005-07-03: 01</revised>
<bug>97399</bug>
<bug>97629</bug>
<access>remote</access>
@@ -55,26 +54,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-XML_RPC-1.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-XML_RPC-1.3.1"</code>
<p>
All phpxmlrpc users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/phpxmlrpc-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/phpxmlrpc-1.1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00088-07022005">GulfTech Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2005 16:53:39 +0000">
+ <metadata tag="requester" timestamp="2005-07-01T16:53:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 02 Jul 2005 09:41:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-02T09:41:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Jul 2005 09:55:08 +0000">
+ <metadata tag="submitter" timestamp="2005-07-02T09:55:08Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-02.xml b/glsa-200507-02.xml
index 6f29d958..7dd9d42b 100644
--- a/glsa-200507-02.xml
+++ b/glsa-200507-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-02">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>July 04, 2005</announced>
- <revised>July 04, 2005: 01</revised>
+ <announced>2005-07-04</announced>
+ <revised>2005-07-04: 01</revised>
<bug>97374</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.5.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.5.1.3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00085-06282005">GulfTech Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Jun 2005 16:03:34 +0000">
+ <metadata tag="requester" timestamp="2005-06-30T16:03:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Jun 2005 17:49:02 +0000">
+ <metadata tag="submitter" timestamp="2005-06-30T17:49:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 04 Jul 2005 09:45:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-04T09:45:20Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-03.xml b/glsa-200507-03.xml
index f68b3464..8bf0eaea 100644
--- a/glsa-200507-03.xml
+++ b/glsa-200507-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-03">
<title>phpBB: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
commands with the rights of the web server.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>July 04, 2005</announced>
- <revised>September 03, 2005: 03</revised>
+ <announced>2005-07-04</announced>
+ <revised>2005-09-03: 03</revised>
<bug>97278</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2086">CAN-2005-2086</uri>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=302011">phpBB Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2086">CAN-2005-2086</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=302011">phpBB Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Jun 2005 13:31:49 +0000">
+ <metadata tag="requester" timestamp="2005-06-29T13:31:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jun 2005 14:18:11 +0000">
+ <metadata tag="submitter" timestamp="2005-06-29T14:18:11Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 02 Jul 2005 09:31:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-02T09:31:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-04.xml b/glsa-200507-04.xml
index 1d2e0947..5d9f5e78 100644
--- a/glsa-200507-04.xml
+++ b/glsa-200507-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-04">
<title>RealPlayer: Heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>96923</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.5"</code>
</resolution>
<references>
<uri link="http://service.real.com/help/faq/security/050623_player/EN/">RealNetworks Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1766">CAN-2005-1766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1766">CAN-2005-1766</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Jun 2005 18:08:55 +0000">
+ <metadata tag="requester" timestamp="2005-06-26T18:08:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2005 18:38:32 +0000">
+ <metadata tag="submitter" timestamp="2005-06-26T18:38:32Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 12:36:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T12:36:44Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-05.xml b/glsa-200507-05.xml
index 7ba55f82..feae4448 100644
--- a/glsa-200507-05.xml
+++ b/glsa-200507-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-05">
<title>zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>98121</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/zlib-1.2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/zlib-1.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 04 Jul 2005 06:51:26 +0000">
+ <metadata tag="submitter" timestamp="2005-07-04T06:51:26Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 14:21:00 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T14:21:00Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-06.xml b/glsa-200507-06.xml
index 4a3d5367..39fe1e47 100644
--- a/glsa-200507-06.xml
+++ b/glsa-200507-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-06">
<title>TikiWiki: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
command execution.
</synopsis>
<product type="ebuild">Tikiwiki</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>97648</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5-r1"</code>
</resolution>
<references>
- <uri link="http://security.gentoo.org/glsa/glsa-200507-01.xml">GLSA 200507-01</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200507-01.xml">GLSA 200507-01</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 08:27:19 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T08:27:19Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 08:27:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T08:27:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 11:56:52 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T11:56:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-07.xml b/glsa-200507-07.xml
index d8117247..91fd88e0 100644
--- a/glsa-200507-07.xml
+++ b/glsa-200507-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-07">
<title>phpWebSite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code and to other, yet undisclosed, vulnerabilities.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>July 10, 2005</announced>
- <revised>July 10, 2005: 01</revised>
+ <announced>2005-07-10</announced>
+ <revised>2005-07-10: 01</revised>
<bug>97461</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/phpwebsite-0.10.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/phpwebsite-0.10.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=989">phpWebSite announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 12:51:16 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T12:51:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 14:39:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T14:39:13Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 22:50:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-09T22:50:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-08.xml b/glsa-200507-08.xml
index 581e0927..306a9a7b 100644
--- a/glsa-200507-08.xml
+++ b/glsa-200507-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-08">
<title>phpGroupWare, eGroupWare: PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to execute arbitrary PHP script commands.
</synopsis>
<product type="ebuild">phpgroupware egroupware</product>
- <announced>July 10, 2005</announced>
- <revised>July 10, 2005: 01</revised>
+ <announced>2005-07-10</announced>
+ <revised>2005-07-10: 01</revised>
<bug>97460</bug>
<bug>97651</bug>
<access>remote</access>
@@ -54,25 +53,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/phpgroupware-0.9.16.006&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/phpgroupware-0.9.16.006"</code>
<p>
All eGroupWare users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/egroupware-1.0.0.008&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/egroupware-1.0.0.008"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 12:50:50 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T12:50:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 15:06:09 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T15:06:09Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jul 2005 19:07:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-10T19:07:48Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-09.xml b/glsa-200507-09.xml
index 7768b114..b7c20e32 100644
--- a/glsa-200507-09.xml
+++ b/glsa-200507-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-09">
<title>Adobe Acrobat Reader: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>July 11, 2005</announced>
- <revised>July 11, 2005: 01</revised>
+ <announced>2005-07-11</announced>
+ <revised>2005-07-11: 01</revised>
<bug>98101</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1625">CAN-2005-1625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1625">CAN-2005-1625</uri>
<uri link="http://www.idefense.com/application/poi/display?id=279&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
- <uri link="http://www.adobe.com/support/techdocs/329083.html">Adobe Security Advisory</uri>
+ <uri link="https://www.adobe.com/support/techdocs/329083.html">Adobe Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jul 2005 08:39:08 +0000">
+ <metadata tag="requester" timestamp="2005-07-08T08:39:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Jul 2005 15:11:50 +0000">
+ <metadata tag="submitter" timestamp="2005-07-08T15:11:50Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 18:37:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-09T18:37:26Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200507-10.xml b/glsa-200507-10.xml
index baed01a1..6e935fb8 100644
--- a/glsa-200507-10.xml
+++ b/glsa-200507-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-10">
<title>Ruby: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>July 11, 2005</announced>
- <revised>July 11, 2005: 01</revised>
+ <announced>2005-07-11</announced>
+ <revised>2005-07-11: 01</revised>
<bug>96784</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.2-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1992">CAN-2005-1992</uri>
- <uri link="http://www.ruby-lang.org/en/20050701.html">Ruby Security Announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1992">CAN-2005-1992</uri>
+ <uri link="https://www.ruby-lang.org/en/20050701.html">Ruby Security Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 09 Jul 2005 18:51:00 +0000">
+ <metadata tag="requester" timestamp="2005-07-09T18:51:00Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2005 19:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-07-09T19:20:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Jul 2005 12:47:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-11T12:47:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-11.xml b/glsa-200507-11.xml
index 82a22a76..260e28ce 100644
--- a/glsa-200507-11.xml
+++ b/glsa-200507-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-11">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
entire Kerberos realm.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>July 12, 2005</announced>
- <revised>July 12, 2005: 01</revised>
+ <announced>2005-07-12</announced>
+ <revised>2005-07-12: 01</revised>
<bug>98799</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1174">CAN-2005-1174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1175">CAN-2005-1175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1689">CAN-2005-1689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1174">CAN-2005-1174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1175">CAN-2005-1175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1689">CAN-2005-1689</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt">MITKRB5-SA-2005-002</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt">MITKRB5-SA-2005-003</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jul 2005 08:49:39 +0000">
+ <metadata tag="requester" timestamp="2005-07-08T08:49:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Jul 2005 14:57:37 +0000">
+ <metadata tag="submitter" timestamp="2005-07-08T14:57:37Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 19:05:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T19:05:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-12.xml b/glsa-200507-12.xml
index 455644ea..307a15a4 100644
--- a/glsa-200507-12.xml
+++ b/glsa-200507-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-12">
<title>Bugzilla: Unauthorized access and information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
flags or gain sensitive information.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>July 13, 2005</announced>
- <revised>July 13, 2005: 01</revised>
+ <announced>2005-07-13</announced>
+ <revised>2005-07-13: 01</revised>
<bug>98348</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-2.18.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-2.18.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2173">CAN-2005-2173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2174">CAN-2005-2174</uri>
- <uri link="http://www.bugzilla.org/security/2.18.1/">Bugzilla Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2173">CAN-2005-2173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2174">CAN-2005-2174</uri>
+ <uri link="https://www.bugzilla.org/security/2.18.1/">Bugzilla Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Jul 2005 07:49:18 +0000">
+ <metadata tag="requester" timestamp="2005-07-12T07:49:18Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 08:01:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T08:01:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Jul 2005 08:53:54 +0000">
+ <metadata tag="submitter" timestamp="2005-07-12T08:53:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-13.xml b/glsa-200507-13.xml
index 7ee89841..4af0b16c 100644
--- a/glsa-200507-13.xml
+++ b/glsa-200507-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-13">
<title>pam_ldap and nss_ldap: Plain text authentication leak</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to credentials being sent in plain text.
</synopsis>
<product type="ebuild">pam_ldap nss_ldap</product>
- <announced>July 14, 2005</announced>
- <revised>July 14, 2005: 01</revised>
+ <announced>2005-07-14</announced>
+ <revised>2005-07-14: 01</revised>
<bug>96767</bug>
<access>remote</access>
<affected>
@@ -58,7 +57,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-178-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-178-r1"</code>
<p>
All nss_ldap users should upgrade to the latest version:
</p>
@@ -67,15 +66,15 @@
# emerge --ask --oneshot --verbose sys-auth/nss_ldap</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069">CAN-2005-2069</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069">CAN-2005-2069</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Jul 2005 08:55:26 +0000">
+ <metadata tag="requester" timestamp="2005-07-04T08:55:26Z">
tigger
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Jul 2005 14:18:57 +0000">
+ <metadata tag="submitter" timestamp="2005-07-04T14:18:57Z">
tigger
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Jul 2005 09:08:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-14T09:08:58Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-14.xml b/glsa-200507-14.xml
index 5b74ccc7..91ad0e29 100644
--- a/glsa-200507-14.xml
+++ b/glsa-200507-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-14">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leak.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>95199</bug>
<access>remote</access>
<affected>
@@ -77,22 +76,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.5"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.5"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 13 Jul 2005 20:26:29 +0000">
+ <metadata tag="submitter" timestamp="2005-07-13T20:26:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Jul 2005 05:32:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-15T05:32:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-15.xml b/glsa-200507-15.xml
index 09ed5344..6ecf41ed 100644
--- a/glsa-200507-15.xml
+++ b/glsa-200507-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-15">
<title>PHP: Script injection through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary PHP script commands.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>97655</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.4.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Jul 2005 20:30:47 +0000">
+ <metadata tag="requester" timestamp="2005-07-12T20:30:47Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Jul 2005 22:51:12 +0000">
+ <metadata tag="submitter" timestamp="2005-07-12T22:51:12Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Jul 2005 13:35:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-15T13:35:35Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-16.xml b/glsa-200507-16.xml
index b6b7c43b..1afb85c8 100644
--- a/glsa-200507-16.xml
+++ b/glsa-200507-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-16">
<title>dhcpcd: Denial of Service vulnerability</title>
<synopsis>
A vulnerability in dhcpcd may cause the dhcpcd daemon to crash.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>98394</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcpcd-1.3.22_p4-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcpcd-1.3.22_p4-r11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1848">CAN-2005-1848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1848">CAN-2005-1848</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2005 14:38:55 +0000">
+ <metadata tag="requester" timestamp="2005-07-11T14:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Jul 2005 17:42:40 +0000">
+ <metadata tag="submitter" timestamp="2005-07-11T17:42:40Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 08:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T08:00:32Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-17.xml b/glsa-200507-17.xml
index d5ff482d..c70fba53 100644
--- a/glsa-200507-17.xml
+++ b/glsa-200507-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-17">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leak.
</synopsis>
<product type="ebuild">thunderbird</product>
- <announced>July 18, 2005</announced>
- <revised>July 18, 2005: 01</revised>
+ <announced>2005-07-18</announced>
+ <revised>2005-07-18: 01</revised>
<bug>98855</bug>
<access>remote</access>
<affected>
@@ -77,23 +76,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.5"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.5"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Jul 2005 11:30:45 +0000">
+ <metadata tag="submitter" timestamp="2005-07-14T11:30:45Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Jul 2005 20:53:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-17T20:53:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200507-18.xml b/glsa-200507-18.xml
index 076ef7d4..6df084ce 100644
--- a/glsa-200507-18.xml
+++ b/glsa-200507-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-18">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>July 20, 2005</announced>
- <revised>August 11, 2005: 03</revised>
+ <announced>2005-07-20</announced>
+ <revised>2005-08-11: 03</revised>
<bug>99132</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2396">CAN-2005-2396</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=342530">MediaWiki Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2396">CAN-2005-2396</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=342530">MediaWiki Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Jul 2005 07:34:17 +0000">
+ <metadata tag="requester" timestamp="2005-07-18T07:34:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Jul 2005 07:34:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-18T07:34:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Jul 2005 07:59:14 +0000">
+ <metadata tag="submitter" timestamp="2005-07-18T07:59:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-19.xml b/glsa-200507-19.xml
index 4e8649c7..7d2255ea 100644
--- a/glsa-200507-19.xml
+++ b/glsa-200507-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-19">
<title>zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>July 22, 2005</announced>
- <revised>July 22, 2005: 01</revised>
+ <announced>2005-07-22</announced>
+ <revised>2005-07-22: 01</revised>
<bug>99751</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/zlib-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/zlib-1.2.3"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0489.html">Full Disclosure Announcement</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Jul 2005 05:28:09 +0000">
+ <metadata tag="requester" timestamp="2005-07-21T05:28:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 21 Jul 2005 07:38:10 +0000">
+ <metadata tag="submitter" timestamp="2005-07-21T07:38:10Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Jul 2005 18:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-21T18:38:18Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200507-20.xml b/glsa-200507-20.xml
index 6251aeed..d04e7614 100644
--- a/glsa-200507-20.xml
+++ b/glsa-200507-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-20">
<title>Shorewall: Security policy bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
filtering to bypass all other security rules.
</synopsis>
<product type="ebuild">shorewall</product>
- <announced>July 22, 2005</announced>
- <revised>September 14, 2005: 02</revised>
+ <announced>2005-07-22</announced>
+ <revised>2005-09-14: 02</revised>
<bug>99398</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-firewall/shorewall</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317">CAN-2005-2317</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317">CAN-2005-2317</uri>
<uri link="http://www.shorewall.net/News.htm#20050717">Shorewall Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Jul 2005 08:32:24 +0000">
+ <metadata tag="requester" timestamp="2005-07-20T08:32:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2005 09:04:23 +0000">
+ <metadata tag="submitter" timestamp="2005-07-20T09:04:23Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Jul 2005 21:07:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-21T21:07:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-21.xml b/glsa-200507-21.xml
index bdf105c4..c8eb1c7d 100644
--- a/glsa-200507-21.xml
+++ b/glsa-200507-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-21">
<title>fetchmail: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Service or arbitrary code execution.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>July 25, 2005</announced>
- <revised>July 25, 2005: 01</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-07-25: 01</revised>
<bug>99865</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.2.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.2.5.2"</code>
</resolution>
<references>
<uri link="http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt">Fetchmail Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2335">CAN-2005-2335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2335">CAN-2005-2335</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Jul 2005 05:37:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-22T05:37:13Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Jul 2005 07:43:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-24T07:43:36Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200507-22.xml b/glsa-200507-22.xml
index a63a7a26..ecf509f0 100644
--- a/glsa-200507-22.xml
+++ b/glsa-200507-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-22">
<title>sandbox: Insecure temporary file handling</title>
<synopsis>
The sandbox utility may create temporary files in an insecure manner.
</synopsis>
<product type="ebuild">sandbox</product>
- <announced>July 25, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-08-11: 02</revised>
<bug>96782</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/sandbox-1.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/sandbox-1.2.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2449">CAN-2005-2449</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2449">CAN-2005-2449</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 11:46:49 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T11:46:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Jul 2005 12:17:37 +0000">
+ <metadata tag="submitter" timestamp="2005-07-23T12:17:37Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Jul 2005 07:49:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-24T07:49:01Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200507-23.xml b/glsa-200507-23.xml
index 9f697949..661ac468 100644
--- a/glsa-200507-23.xml
+++ b/glsa-200507-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-23">
<title>Kopete: Vulnerability in included Gadu library</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">kopete</product>
- <announced>July 25, 2005</announced>
- <revised>July 25, 2005: 01</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-07-25: 01</revised>
<bug>99754</bug>
<access>remote</access>
<affected>
@@ -60,16 +59,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kopete-3.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kopete-3.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20050721-1.txt">KDE Security Advisory: libgadu vulnerabilities</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050721-1.txt">KDE Security Advisory: libgadu vulnerabilities</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Jul 2005 09:34:55 +0000">
+ <metadata tag="submitter" timestamp="2005-07-21T09:34:55Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jul 2005 17:39:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-25T17:39:48Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-24.xml b/glsa-200507-24.xml
index 53e2e779..27fc0f52 100644
--- a/glsa-200507-24.xml
+++ b/glsa-200507-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-24">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
leakage.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>July 26, 2005</announced>
- <revised>July 26, 2005: 01</revised>
+ <announced>2005-07-26</announced>
+ <revised>2005-07-26: 01</revised>
<bug>98846</bug>
<access>remote</access>
<affected>
@@ -86,25 +85,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.10"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.10"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 18:08:05 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T18:08:05Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Jul 2005 18:09:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-23T18:09:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Jul 2005 07:24:03 +0000">
+ <metadata tag="submitter" timestamp="2005-07-24T07:24:03Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200507-25.xml b/glsa-200507-25.xml
index 81f3657d..d720a31c 100644
--- a/glsa-200507-25.xml
+++ b/glsa-200507-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-25">
<title>Clam AntiVirus: Integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
file formats, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>July 26, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-26</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100178</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.86.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.86.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450">CAN-2005-2450</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=344514">Clam AntiVirus: Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450">CAN-2005-2450</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=344514">Clam AntiVirus: Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Jul 2005 17:48:24 +0000">
+ <metadata tag="requester" timestamp="2005-07-25T17:48:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Jul 2005 19:44:22 +0000">
+ <metadata tag="submitter" timestamp="2005-07-25T19:44:22Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jul 2005 20:33:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-26T20:33:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-26.xml b/glsa-200507-26.xml
index 39db4491..6b382fec 100644
--- a/glsa-200507-26.xml
+++ b/glsa-200507-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-26">
<title>GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library</title>
<synopsis>
@@ -9,8 +8,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">gnugadu centericq kadu ekg libgadu</product>
- <announced>July 27, 2005</announced>
- <revised>February 26, 2007: 02</revised>
+ <announced>2005-07-27</announced>
+ <revised>2007-02-26: 02</revised>
<bug>99816</bug>
<bug>99890</bug>
<bug>99583</bug>
@@ -67,47 +66,47 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gnugadu-2.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gnugadu-2.2.6-r1"</code>
<p>
All Kadu users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/kadu-0.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/kadu-0.4.1"</code>
<p>
All EKG users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/ekg-1.6_rc3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/ekg-1.6_rc3"</code>
<p>
All libgadu users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/libgadu-20050719&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/libgadu-20050719"</code>
<p>
All CenterICQ users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/centericq-4.20.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/centericq-4.20.0-r3"</code>
<p>
CenterICQ is no longer distributed with Gadu Gadu support, affected
users are encouraged to migrate to an alternative package.
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
<uri link="http://www.securityfocus.com/archive/1/406026/30/">BugTraq Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 12:05:13 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T12:05:13Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Jul 2005 12:53:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-23T12:53:13Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jul 2005 19:58:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-26T19:58:40Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200507-27.xml b/glsa-200507-27.xml
index 1a08c99b..5f3ab415 100644
--- a/glsa-200507-27.xml
+++ b/glsa-200507-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-27">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>July 28, 2005</announced>
- <revised>July 28, 2005: 01</revised>
+ <announced>2005-07-28</announced>
+ <revised>2005-07-28: 01</revised>
<bug>100316</bug>
<access>remote</access>
<affected>
@@ -57,23 +56,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.12"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00020.html">Ethereal enpa-sa-00020</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360">CAN-2005-2360</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361">CAN-2005-2361</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362">CAN-2005-2362</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363">CAN-2005-2363</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364">CAN-2005-2364</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365">CAN-2005-2365</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366">CAN-2005-2366</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367">CAN-2005-2367</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360">CAN-2005-2360</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361">CAN-2005-2361</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362">CAN-2005-2362</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363">CAN-2005-2363</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364">CAN-2005-2364</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365">CAN-2005-2365</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366">CAN-2005-2366</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367">CAN-2005-2367</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 26 Jul 2005 19:41:31 +0000">
+ <metadata tag="submitter" timestamp="2005-07-26T19:41:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Jul 2005 05:33:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-28T05:33:45Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200507-28.xml b/glsa-200507-28.xml
index 307121c4..d66e6520 100644
--- a/glsa-200507-28.xml
+++ b/glsa-200507-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-28">
<title>AMD64 x86 emulation base libraries: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
zlib which could potentially lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>July 30, 2005</announced>
- <revised>August 02, 2005: 02</revised>
+ <announced>2005-07-30</announced>
+ <revised>2005-08-02: 02</revised>
<bug>100686</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-baselibs</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Jul 2005 08:48:26 +0000">
+ <metadata tag="requester" timestamp="2005-07-30T08:48:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Jul 2005 08:50:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-30T08:50:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 09:53:12 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T09:53:12Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200507-29.xml b/glsa-200507-29.xml
index 5865f8ed..3d16cf15 100644
--- a/glsa-200507-29.xml
+++ b/glsa-200507-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-29">
<title>pstotext: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">pstotext</product>
- <announced>July 31, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-31</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100245</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pstotext-1.8g-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pstotext-1.8g-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2536">CAN-2005-2536</uri>
- <uri link="http://secunia.com/advisories/16183/">Secunia Advisory SA16183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2536">CAN-2005-2536</uri>
+ <uri link="https://secunia.com/advisories/16183/">Secunia Advisory SA16183</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Jul 2005 18:50:03 +0000">
+ <metadata tag="requester" timestamp="2005-07-30T18:50:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Jul 2005 18:53:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-30T18:53:14Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 19:15:41 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T19:15:41Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200508-01.xml b/glsa-200508-01.xml
index 8cb9ee8e..39aade58 100644
--- a/glsa-200508-01.xml
+++ b/glsa-200508-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-01">
<title>Compress::Zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Compress-Zlib</product>
- <announced>August 01, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-08-01</announced>
+ <revised>2009-05-28: 02</revised>
<bug>100540</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Zlib-1.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Zlib-1.35"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Jul 2005 11:43:56 +0000">
+ <metadata tag="requester" timestamp="2005-07-28T11:43:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Jul 2005 23:24:17 +0000">
+ <metadata tag="submitter" timestamp="2005-07-29T23:24:17Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 Aug 2005 05:55:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-01T05:55:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200508-02.xml b/glsa-200508-02.xml
index ce7f3728..9965ca5f 100644
--- a/glsa-200508-02.xml
+++ b/glsa-200508-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-02">
<title>ProFTPD: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>August 01, 2005</announced>
- <revised>August 01, 2005: 01</revised>
+ <announced>2005-08-01</announced>
+ <revised>2005-08-01: 01</revised>
<bug>100364</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.2.10-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.2.10-r7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2390">CAN-2005-2390</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2390">CAN-2005-2390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Jul 2005 14:13:46 +0000">
+ <metadata tag="requester" timestamp="2005-07-27T14:13:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 00:11:05 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T00:11:05Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 31 Jul 2005 14:18:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-31T14:18:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200508-03.xml b/glsa-200508-03.xml
index 25da2e05..0be0f65b 100644
--- a/glsa-200508-03.xml
+++ b/glsa-200508-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-03">
<title>nbSMTP: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nbsmtp</product>
- <announced>August 02, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-08-02</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100274</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/nbsmtp-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/nbsmtp-1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2409">CAN-2005-2409</uri>
- <uri link="http://nbsmtp.ferdyx.org/">nbSMTP official site</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2409">CAN-2005-2409</uri>
+ <uri link="https://nbsmtp.ferdyx.org/">nbSMTP official site</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jul 2005 15:56:07 +0000">
+ <metadata tag="requester" timestamp="2005-07-29T15:56:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Jul 2005 23:01:19 +0000">
+ <metadata tag="submitter" timestamp="2005-07-29T23:01:19Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Aug 2005 12:46:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-02T12:46:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-04.xml b/glsa-200508-04.xml
index 8fde1ceb..9ad88245 100644
--- a/glsa-200508-04.xml
+++ b/glsa-200508-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-04">
<title>Netpbm: Arbitrary code execution in pstopnm</title>
<synopsis>
@@ -8,8 +7,8 @@
which can potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>August 05, 2005</announced>
- <revised>May 28, 2009: 06</revised>
+ <announced>2005-08-05</announced>
+ <revised>2009-05-28: 06</revised>
<bug>100398</bug>
<access>remote</access>
<affected>
@@ -62,16 +61,16 @@
# emerge --ask --oneshot --verbose media-libs/netpbm</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2471">CAN-2005-2471</uri>
- <uri link="http://secunia.com/advisories/16184/">Secunia Advisory SA16184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2471">CAN-2005-2471</uri>
+ <uri link="https://secunia.com/advisories/16184/">Secunia Advisory SA16184</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Aug 2005 10:10:20 +0000">
+ <metadata tag="requester" timestamp="2005-08-02T10:10:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Aug 2005 11:24:11 +0000">
+ <metadata tag="submitter" timestamp="2005-08-02T11:24:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Aug 2005 10:42:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-05T10:42:23Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-05.xml b/glsa-200508-05.xml
index ef3ab947..44fdd5a3 100644
--- a/glsa-200508-05.xml
+++ b/glsa-200508-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-05">
<title>Heartbeat: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">Heartbeat</product>
- <announced>August 07, 2005</announced>
- <revised>August 07, 2005: 01</revised>
+ <announced>2005-08-07</announced>
+ <revised>2005-08-07: 01</revised>
<bug>97175</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/heartbeat-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/heartbeat-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2231">CAN-2005-2231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2231">CAN-2005-2231</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Aug 2005 07:37:14 +0000">
+ <metadata tag="requester" timestamp="2005-08-05T07:37:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Aug 2005 14:33:59 +0000">
+ <metadata tag="submitter" timestamp="2005-08-05T14:33:59Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Aug 2005 14:54:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-05T14:54:26Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200508-06.xml b/glsa-200508-06.xml
index bf1454d1..ceb685f5 100644
--- a/glsa-200508-06.xml
+++ b/glsa-200508-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-06">
<title>Gaim: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or to a Denial of Service.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>August 15, 2005</announced>
- <revised>August 15, 2005: 01</revised>
+ <announced>2005-08-15</announced>
+ <revised>2005-08-15: 01</revised>
<bug>102000</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102">CAN-2005-2102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103">CAN-2005-2103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102">CAN-2005-2102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103">CAN-2005-2103</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Aug 2005 08:01:27 +0000">
+ <metadata tag="requester" timestamp="2005-08-12T08:01:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 19:16:18 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T19:16:18Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:53:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:53:41Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-07.xml b/glsa-200508-07.xml
index d4ecdd3b..4b16fc7e 100644
--- a/glsa-200508-07.xml
+++ b/glsa-200508-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-07">
<title>AWStats: Arbitrary code execution using malicious Referrer information</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary Perl code during the generation of the statistics.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>August 16, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-08-16</announced>
+ <revised>2009-05-28: 02</revised>
<bug>102145</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.5"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1527">CAN-2005-1527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1527">CAN-2005-1527</uri>
<uri link="http://www.idefense.com/application/poi/display?id=290&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 17:33:30 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T17:33:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:56:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:56:51Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-08.xml b/glsa-200508-08.xml
index 13ff3f70..34e50eb1 100644
--- a/glsa-200508-08.xml
+++ b/glsa-200508-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-08">
<title>Xpdf, Kpdf, GPdf: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">xpdf kpdf gpdf</product>
- <announced>August 16, 2005</announced>
- <revised>August 16, 2005: 01</revised>
+ <announced>2005-08-16</announced>
+ <revised>2005-08-16: 01</revised>
<bug>99769</bug>
<bug>100263</bug>
<bug>100265</bug>
@@ -65,37 +64,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r10"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r1"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.3.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.2-r3"</code>
<p>
All KDE Split Ebuild Kpdf users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097">CAN-2005-2097</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097">CAN-2005-2097</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Aug 2005 15:22:33 +0000">
+ <metadata tag="requester" timestamp="2005-08-12T15:22:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 20:47:38 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T20:47:38Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:53:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:53:33Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-09.xml b/glsa-200508-09.xml
index 725701fa..3dbfc021 100644
--- a/glsa-200508-09.xml
+++ b/glsa-200508-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-09">
<title>bluez-utils: Bluetooth device name validation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">bluez-utils</product>
- <announced>August 17, 2005</announced>
- <revised>August 17, 2005: 01</revised>
+ <announced>2005-08-17</announced>
+ <revised>2005-08-17: 01</revised>
<bug>101557</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-utils-2.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-utils-2.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547">CAN-2005-2547</uri>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/bluez/utils/ChangeLog?rev=1.28&amp;view=markup">bluez-utils ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547">CAN-2005-2547</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/bluez/utils/ChangeLog?rev=1.28&amp;view=markup">bluez-utils ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Aug 2005 20:35:32 +0000">
+ <metadata tag="requester" timestamp="2005-08-09T20:35:32Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Aug 2005 02:45:23 +0000">
+ <metadata tag="submitter" timestamp="2005-08-10T02:45:23Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Aug 2005 13:18:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-17T13:18:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200508-10.xml b/glsa-200508-10.xml
index 1bbea807..0b97e67d 100644
--- a/glsa-200508-10.xml
+++ b/glsa-200508-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-10">
<title>Kismet: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Kismet</product>
- <announced>August 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-08-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>102702</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/kismet-2005.08.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/kismet-2005.08.1"</code>
</resolution>
<references>
- <uri link="http://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt">Kismet Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2626">CVE-2005-2626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2627">CVE-2005-2627</uri>
+ <uri link="https://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt">Kismet Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2626">CVE-2005-2626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2627">CVE-2005-2627</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Aug 2005 05:08:47 +0000">
+ <metadata tag="requester" timestamp="2005-08-17T05:08:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Aug 2005 05:16:35 +0000">
+ <metadata tag="submitter" timestamp="2005-08-18T05:16:35Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Aug 2005 07:53:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-18T07:53:07Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200508-11.xml b/glsa-200508-11.xml
index 0828e25e..8ad19842 100644
--- a/glsa-200508-11.xml
+++ b/glsa-200508-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-11">
<title>Adobe Reader: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 19, 2005</announced>
- <revised>August 19, 2005: 01</revised>
+ <announced>2005-08-19</announced>
+ <revised>2005-08-19: 01</revised>
<bug>102730</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2470">CAN-2005-2470</uri>
- <uri link="http://www.adobe.com/support/techdocs/321644.html">Adobe Document 321644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2470">CAN-2005-2470</uri>
+ <uri link="https://www.adobe.com/support/techdocs/321644.html">Adobe Document 321644</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Aug 2005 23:13:16 +0000">
+ <metadata tag="requester" timestamp="2005-08-16T23:13:16Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Aug 2005 16:19:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-17T16:19:50Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Aug 2005 16:52:49 +0000">
+ <metadata tag="submitter" timestamp="2005-08-17T16:52:49Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200508-12.xml b/glsa-200508-12.xml
index 6794894e..8700302e 100644
--- a/glsa-200508-12.xml
+++ b/glsa-200508-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-12">
<title>Evolution: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in remote execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>August 23, 2005</announced>
- <revised>August 23, 2005: 01</revised>
+ <announced>2005-08-23</announced>
+ <revised>2005-08-23: 01</revised>
<bug>102051</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.2.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.2.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549">CAN-2005-2549</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550">CAN-2005-2550</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549">CAN-2005-2549</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550">CAN-2005-2550</uri>
<uri link="http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html">SITIC Vulnerability Advisory SA05-001</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Aug 2005 20:42:02 +0000">
+ <metadata tag="requester" timestamp="2005-08-21T20:42:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Aug 2005 11:14:56 +0000">
+ <metadata tag="submitter" timestamp="2005-08-22T11:14:56Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 07:46:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T07:46:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-13.xml b/glsa-200508-13.xml
index 5de3ef71..422f574e 100644
--- a/glsa-200508-13.xml
+++ b/glsa-200508-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-13">
<title>PEAR XML-RPC, phpxmlrpc: New PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP script commands.
</synopsis>
<product type="ebuild">pear-xml_rpc phpxmlrpc</product>
- <announced>August 24, 2005</announced>
- <revised>August 24, 2005: 01</revised>
+ <announced>2005-08-24</announced>
+ <revised>2005-08-24: 01</revised>
<bug>102378</bug>
<bug>102576</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-XML_RPC-1.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-XML_RPC-1.4.0"</code>
<p>
All phpxmlrpc users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/phpxmlrpc-1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/phpxmlrpc-1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
- <uri link="http://www.hardened-php.net/advisory_142005.66.html">Hardened-PHP 14/2005 Advisory</uri>
- <uri link="http://www.hardened-php.net/advisory_152005.67.html">Hardened-PHP 15/2005 Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.hardened-php.net/advisory_142005.66.html">Hardened-PHP 14/2005 Advisory</uri>
+ <uri link="https://www.hardened-php.net/advisory_152005.67.html">Hardened-PHP 15/2005 Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 08:36:20 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T08:36:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 20:48:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T20:48:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-14.xml b/glsa-200508-14.xml
index 3440351e..abd586e7 100644
--- a/glsa-200508-14.xml
+++ b/glsa-200508-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-14">
<title>TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary command execution.
</synopsis>
<product type="ebuild">tikiwiki egroupware</product>
- <announced>August 24, 2005</announced>
- <revised>August 24, 2005: 01</revised>
+ <announced>2005-08-24</announced>
+ <revised>2005-08-24: 01</revised>
<bug>102374</bug>
<bug>102377</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5-r2"</code>
<p>
All eGroupWare users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.0.0.009&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.0.0.009"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Aug 2005 20:59:23 +0000">
+ <metadata tag="requester" timestamp="2005-08-22T20:59:23Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 23:39:36 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T23:39:36Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Aug 2005 19:23:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-24T19:23:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-15.xml b/glsa-200508-15.xml
index d775a281..41a6dfec 100644
--- a/glsa-200508-15.xml
+++ b/glsa-200508-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-15">
<title>Apache 2.0: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">apache</product>
- <announced>August 25, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-08-25</announced>
+ <revised>2007-12-30: 03</revised>
<bug>102991</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.54-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.54-r9"</code>
</resolution>
<references>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=29962">ASF Bugzilla Bug 29962</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728">CVE-2005-2728</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=29962">ASF Bugzilla Bug 29962</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728">CVE-2005-2728</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Aug 2005 07:26:08 +0000">
+ <metadata tag="requester" timestamp="2005-08-22T07:26:08Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Aug 2005 07:47:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-22T07:47:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Aug 2005 00:58:46 +0000">
+ <metadata tag="submitter" timestamp="2005-08-24T00:58:46Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200508-16.xml b/glsa-200508-16.xml
index c90d5976..05edeaba 100644
--- a/glsa-200508-16.xml
+++ b/glsa-200508-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-16">
<title>Tor: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
anonymity, integrity and confidentiality.
</synopsis>
<product type="ebuild">tor</product>
- <announced>August 25, 2005</announced>
- <revised>August 25, 2005: 01</revised>
+ <announced>2005-08-25</announced>
+ <revised>2005-08-25: 01</revised>
<bug>102245</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.1.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.1.0.14"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2643">CAN-2005-2643</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2643">CAN-2005-2643</uri>
<uri link="http://archives.seul.org/or/announce/Aug-2005/msg00002.html">Tor Security Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Aug 2005 08:23:08 +0000">
+ <metadata tag="requester" timestamp="2005-08-23T08:23:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 09:42:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T09:42:34Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 16:08:44 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T16:08:44Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200508-17.xml b/glsa-200508-17.xml
index 6ec5e046..da525d57 100644
--- a/glsa-200508-17.xml
+++ b/glsa-200508-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-17">
<title>libpcre: Heap integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libpcre</product>
- <announced>August 25, 2005</announced>
- <revised>August 25, 2005: 01</revised>
+ <announced>2005-08-25</announced>
+ <revised>2005-08-25: 01</revised>
<bug>103337</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
<uri link="http://www.securitytracker.com/alerts/2005/Aug/1014744.html">SecurityTracker Alert ID 1014744</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Aug 2005 08:06:54 +0000">
+ <metadata tag="requester" timestamp="2005-08-23T08:06:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 16:35:02 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T16:35:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 19:48:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T19:48:38Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200508-18.xml b/glsa-200508-18.xml
index cb56908d..be0fbbf7 100644
--- a/glsa-200508-18.xml
+++ b/glsa-200508-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-18">
<title>PhpWiki: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>August 26, 2005</announced>
- <revised>August 26, 2005: 01</revised>
+ <announced>2005-08-26</announced>
+ <revised>2005-08-26: 01</revised>
<bug>102380</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Aug 2005 08:45:11 +0000">
+ <metadata tag="requester" timestamp="2005-08-25T08:45:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Aug 2005 11:46:47 +0000">
+ <metadata tag="submitter" timestamp="2005-08-25T11:46:47Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 Aug 2005 20:44:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-25T20:44:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200508-19.xml b/glsa-200508-19.xml
index 7f29c0cc..6d949660 100644
--- a/glsa-200508-19.xml
+++ b/glsa-200508-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-19">
<title>lm_sensors: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">lm_sensors</product>
- <announced>August 30, 2005</announced>
- <revised>August 30, 2005: 01</revised>
+ <announced>2005-08-30</announced>
+ <revised>2005-08-30: 01</revised>
<bug>103568</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/lm_sensors-2.9.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/lm_sensors-2.9.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672">CAN-2005-2672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672">CAN-2005-2672</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Aug 2005 09:37:19 +0000">
+ <metadata tag="requester" timestamp="2005-08-27T09:37:19Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 Aug 2005 09:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-27T09:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Aug 2005 22:28:16 +0000">
+ <metadata tag="submitter" timestamp="2005-08-27T22:28:16Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200508-20.xml b/glsa-200508-20.xml
index 54cb4f99..3d0d6d92 100644
--- a/glsa-200508-20.xml
+++ b/glsa-200508-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-20">
<title>phpGroupWare: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure to a potential execution of arbitrary code.
</synopsis>
<product type="ebuild">phpgroupware</product>
- <announced>August 30, 2005</announced>
- <revised>August 30, 2005: 01</revised>
+ <announced>2005-08-30</announced>
+ <revised>2005-08-30: 01</revised>
<bug>102379</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpgroupware-0.9.16.008&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpgroupware-0.9.16.008"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2498">CAN-2005-2498</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2600">CAN-2005-2600</uri>
- <uri link="http://secunia.com/advisories/16414">Secunia Advisory SA16414</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2600">CAN-2005-2600</uri>
+ <uri link="https://secunia.com/advisories/16414">Secunia Advisory SA16414</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Aug 2005 18:52:38 +0000">
+ <metadata tag="requester" timestamp="2005-08-28T18:52:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Aug 2005 09:01:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-29T09:01:02Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 10:35:27 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T10:35:27Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200508-21.xml b/glsa-200508-21.xml
index 0299cda3..d654cf9f 100644
--- a/glsa-200508-21.xml
+++ b/glsa-200508-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-21">
<title>phpWebSite: Arbitrary command execution through XML-RPC and SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and SQL injection.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>August 31, 2005</announced>
- <revised>August 31, 2005: 01</revised>
+ <announced>2005-08-31</announced>
+ <revised>2005-08-31: 01</revised>
<bug>102785</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.2_rc2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.2_rc2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0497.html">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Aug 2005 18:35:22 +0000">
+ <metadata tag="requester" timestamp="2005-08-25T18:35:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 11:14:08 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T11:14:08Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Aug 2005 02:40:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-31T02:40:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200508-22.xml b/glsa-200508-22.xml
index 9023f088..8d72fe78 100644
--- a/glsa-200508-22.xml
+++ b/glsa-200508-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-22">
<title>pam_ldap: Authentication bypass vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
system access.
</synopsis>
<product type="ebuild">pam_ldap</product>
- <announced>August 31, 2005</announced>
- <revised>August 31, 2005: 01</revised>
+ <announced>2005-08-31</announced>
+ <revised>2005-08-31: 01</revised>
<bug>103659</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-180&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-180"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641">CAN-2005-2641</uri>
- <uri link="http://www.kb.cert.org/vuls/id/778916">US-CERT VU#778916</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641">CAN-2005-2641</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/778916">US-CERT VU#778916</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Aug 2005 14:50:51 +0000">
+ <metadata tag="requester" timestamp="2005-08-29T14:50:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Aug 2005 14:51:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-29T14:51:34Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 20:08:30 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T20:08:30Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200509-01.xml b/glsa-200509-01.xml
index c3c6aff1..c0210eac 100644
--- a/glsa-200509-01.xml
+++ b/glsa-200509-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-01">
<title>MPlayer: Heap overflow in ad_pcm.c</title>
<synopsis>
A heap overflow in MPlayer might lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>September 01, 2005</announced>
- <revised>September 01, 2005: 01</revised>
+ <announced>2005-09-01</announced>
+ <revised>2005-09-01: 01</revised>
<bug>103555</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2718">CAN-2005-2718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2718">CAN-2005-2718</uri>
<uri link="http://www.sven-tantau.de/public_files/mplayer/mplayer_20050824.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 Aug 2005 16:55:40 +0000">
+ <metadata tag="submitter" timestamp="2005-08-28T16:55:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Sep 2005 08:08:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-01T08:08:19Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-02.xml b/glsa-200509-02.xml
index 81fe8cca..61c7524f 100644
--- a/glsa-200509-02.xml
+++ b/glsa-200509-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-02">
<title>Gnumeric: Heap overflow in the included PCRE library</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Gnumeric</product>
- <announced>September 03, 2005</announced>
- <revised>September 03, 2005: 01</revised>
+ <announced>2005-09-03</announced>
+ <revised>2005-09-03: 01</revised>
<bug>104010</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.4.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.4.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Sep 2005 07:34:06 +0000">
+ <metadata tag="requester" timestamp="2005-09-02T07:34:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 02 Sep 2005 08:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-02T08:27:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Sep 2005 15:23:09 +0000">
+ <metadata tag="submitter" timestamp="2005-09-02T15:23:09Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200509-03.xml b/glsa-200509-03.xml
index ac11b90d..12a72e13 100644
--- a/glsa-200509-03.xml
+++ b/glsa-200509-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-03">
<title>OpenTTD: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>September 05, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-05</announced>
+ <revised>2006-05-22: 02</revised>
<bug>102631</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.4.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.4.0.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2763">CAN-2005-2763</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2764">CVE-2005-2764</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2763">CAN-2005-2763</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2764">CVE-2005-2764</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Sep 2005 05:03:56 +0000">
+ <metadata tag="requester" timestamp="2005-09-01T05:03:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Sep 2005 08:12:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-01T08:12:01Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Sep 2005 15:43:14 +0000">
+ <metadata tag="submitter" timestamp="2005-09-04T15:43:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200509-04.xml b/glsa-200509-04.xml
index c9e73314..6e96d06b 100644
--- a/glsa-200509-04.xml
+++ b/glsa-200509-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-04">
<title>phpLDAPadmin: Authentication bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
and connect anonymously.
</synopsis>
<product type="ebuild">phpLDAPadmin</product>
- <announced>September 06, 2005</announced>
- <revised>September 06, 2005: 01</revised>
+ <announced>2005-09-06</announced>
+ <revised>2005-09-06: 01</revised>
<bug>104293</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/phpldapadmin-0.9.7_alpha6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/phpldapadmin-0.9.7_alpha6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2654">CAN-2005-2654</uri>
- <uri link="http://secunia.com/advisories/16611/">Secunia Advisory SA16611</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2654">CAN-2005-2654</uri>
+ <uri link="https://secunia.com/advisories/16611/">Secunia Advisory SA16611</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 31 Aug 2005 17:15:50 +0000">
+ <metadata tag="requester" timestamp="2005-08-31T17:15:50Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Aug 2005 17:15:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-31T17:15:59Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Sep 2005 18:39:01 +0000">
+ <metadata tag="submitter" timestamp="2005-09-02T18:39:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-05.xml b/glsa-200509-05.xml
index 479da6e6..a072ab57 100644
--- a/glsa-200509-05.xml
+++ b/glsa-200509-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-05">
<title>Net-SNMP: Insecure RPATH</title>
<synopsis>
@@ -8,8 +7,8 @@
DT_RPATH, potentially allowing privilege escalation.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>September 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>103776</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.2.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.2.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2811">CVE-2005-2811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2811">CVE-2005-2811</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 04 Sep 2005 14:57:52 +0000">
+ <metadata tag="requester" timestamp="2005-09-04T14:57:52Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Sep 2005 15:49:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-04T15:49:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Sep 2005 23:48:38 +0000">
+ <metadata tag="submitter" timestamp="2005-09-04T23:48:38Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200509-06.xml b/glsa-200509-06.xml
index 44e14710..847d94eb 100644
--- a/glsa-200509-06.xml
+++ b/glsa-200509-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-06">
<title>Squid: Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>September 07, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-09-07</announced>
+ <revised>2006-05-22: 03</revised>
<bug>104603</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.10-r2"</code>
</resolution>
<references>
<uri link="http://www.squid-cache.org/Versions/v2/2.5/bugs/">Squid Patches</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794">CVE-2005-2794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2796">CVE-2005-2796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794">CVE-2005-2794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2796">CVE-2005-2796</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 05 Sep 2005 08:24:13 +0000">
+ <metadata tag="submitter" timestamp="2005-09-05T08:24:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Sep 2005 08:39:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-05T08:39:15Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200509-07.xml b/glsa-200509-07.xml
index f09f61d5..1586543c 100644
--- a/glsa-200509-07.xml
+++ b/glsa-200509-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-07">
<title>X.Org: Heap overflow in pixmap allocation</title>
<synopsis>
@@ -8,8 +7,8 @@
X.Org user to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>September 12, 2005</announced>
- <revised>September 12, 2005: 01</revised>
+ <announced>2005-09-12</announced>
+ <revised>2005-09-12: 01</revised>
<bug>105688</bug>
<access>local</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.8.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.8.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495">CAN-2005-2495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495">CAN-2005-2495</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 06 Sep 2005 08:58:25 +0000">
+ <metadata tag="submitter" timestamp="2005-09-06T08:58:25Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Sep 2005 15:28:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-12T15:28:20Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-08.xml b/glsa-200509-08.xml
index 4f8d849c..c960d6d1 100644
--- a/glsa-200509-08.xml
+++ b/glsa-200509-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-08">
<title>Python: Heap overflow in the included PCRE library</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">Python</product>
- <announced>September 12, 2005</announced>
- <revised>September 12, 2005: 01</revised>
+ <announced>2005-09-12</announced>
+ <revised>2005-09-12: 01</revised>
<bug>104009</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2005 18:18:03 +0000">
+ <metadata tag="requester" timestamp="2005-09-10T18:18:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Sep 2005 15:37:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-11T15:37:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Sep 2005 18:47:02 +0000">
+ <metadata tag="submitter" timestamp="2005-09-11T18:47:02Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-09.xml b/glsa-200509-09.xml
index 15c976c9..8cfd2f4b 100644
--- a/glsa-200509-09.xml
+++ b/glsa-200509-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-09">
<title>Py2Play: Remote execution of arbitrary Python code</title>
<synopsis>
A design error in Py2Play allows attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">py2play</product>
- <announced>September 17, 2005</announced>
- <revised>September 05, 2006: 02</revised>
+ <announced>2005-09-17</announced>
+ <revised>2006-09-05: 02</revised>
<bug>103524</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/py2play-0.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/py2play-0.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2875">CAN-2005-2875</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2875">CAN-2005-2875</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Sep 2005 14:02:17 +0000">
+ <metadata tag="requester" timestamp="2005-09-13T14:02:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Sep 2005 11:59:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-14T11:59:59Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Sep 2005 20:47:34 +0000">
+ <metadata tag="submitter" timestamp="2005-09-14T20:47:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-10.xml b/glsa-200509-10.xml
index aeb1a38d..6fe31b2d 100644
--- a/glsa-200509-10.xml
+++ b/glsa-200509-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-10">
<title>Mailutils: Format string vulnerability in imap4d</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code with the privileges of the imap4d process.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>September 17, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105458</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r2"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=303&amp;type=vulnerabilities">iDEFENSE 09.09.05 advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878">CVE-2005-2878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878">CVE-2005-2878</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Sep 2005 13:42:03 +0000">
+ <metadata tag="submitter" timestamp="2005-09-15T13:42:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Sep 2005 13:42:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-15T13:42:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-11.xml b/glsa-200509-11.xml
index 83904701..c7248b60 100644
--- a/glsa-200509-11.xml
+++ b/glsa-200509-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-11">
<title>Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
that might be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>September 18, 2005</announced>
- <revised>September 29, 2005: 02</revised>
+ <announced>2005-09-18</announced>
+ <revised>2005-09-29: 02</revised>
<bug>105396</bug>
<access>remote</access>
<affected>
@@ -83,50 +82,50 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.7-r2"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.12-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.12-r2"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.7"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.12"</code>
<p>
All Gecko library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gecko-sdk-1.7.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gecko-sdk-1.7.12"</code>
<p>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Sep 2005 12:38:09 +0000">
+ <metadata tag="submitter" timestamp="2005-09-15T12:38:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Sep 2005 09:17:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-18T09:17:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-12.xml b/glsa-200509-12.xml
index 2499a573..2e1fc0e3 100644
--- a/glsa-200509-12.xml
+++ b/glsa-200509-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-12">
<title>Apache, mod_ssl: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>September 19, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-09-19</announced>
+ <revised>2007-12-30: 03</revised>
<bug>103554</bug>
<bug>104807</bug>
<access>remote and local</access>
@@ -61,25 +60,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-www/mod_ssl-2.8.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-www/mod_ssl-2.8.24"</code>
<p>
All Apache 2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.54-r15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.54-r15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700">CAN-2005-2700</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700">CAN-2005-2700</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Sep 2005 10:15:26 +0000">
+ <metadata tag="requester" timestamp="2005-09-11T10:15:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Sep 2005 16:41:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-16T16:41:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Sep 2005 14:36:28 +0000">
+ <metadata tag="submitter" timestamp="2005-09-17T14:36:28Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200509-13.xml b/glsa-200509-13.xml
index b8096bd6..4592d894 100644
--- a/glsa-200509-13.xml
+++ b/glsa-200509-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-13">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execution of arbitrary code when handling compressed executables.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 19, 2005</announced>
- <revised>September 19, 2005: 01</revised>
+ <announced>2005-09-19</announced>
+ <revised>2005-09-19: 01</revised>
<bug>106279</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.87&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.87"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2919">CAN-2005-2919</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2920">CAN-2005-2920</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=356974">Clam AntiVirus: Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2919">CAN-2005-2919</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2920">CAN-2005-2920</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=356974">Clam AntiVirus: Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 18 Sep 2005 16:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-09-18T16:20:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Sep 2005 16:20:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-18T16:20:41Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-14.xml b/glsa-200509-14.xml
index 0239eba3..3aac45f5 100644
--- a/glsa-200509-14.xml
+++ b/glsa-200509-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-14">
<title>Zebedee: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">zebedee</product>
- <announced>September 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105115</bug>
<access>remote</access>
<affected>
@@ -52,15 +51,15 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/14796">BugTraq ID 14796</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2904">CVE-2005-2904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2904">CVE-2005-2904</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Sep 2005 10:16:59 +0000">
+ <metadata tag="requester" timestamp="2005-09-14T10:16:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Sep 2005 08:11:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-16T08:11:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Sep 2005 12:52:52 +0000">
+ <metadata tag="submitter" timestamp="2005-09-17T12:52:52Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200509-15.xml b/glsa-200509-15.xml
index 9a8648d4..762d958c 100644
--- a/glsa-200509-15.xml
+++ b/glsa-200509-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-15">
<title>util-linux: umount command validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>September 20, 2005</announced>
- <revised>September 20, 2005: 01</revised>
+ <announced>2005-09-20</announced>
+ <revised>2005-09-20: 01</revised>
<bug>105805</bug>
<access>local</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/util-linux-2.12q-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/util-linux-2.12q-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2876">CAN-2005-2876</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2876">CAN-2005-2876</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Sep 2005 16:18:46 +0000">
+ <metadata tag="requester" timestamp="2005-09-17T16:18:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 Sep 2005 16:52:19 +0000">
+ <metadata tag="submitter" timestamp="2005-09-19T16:52:19Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Sep 2005 14:09:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-20T14:09:16Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-16.xml b/glsa-200509-16.xml
index 76baa76e..6d6dbb20 100644
--- a/glsa-200509-16.xml
+++ b/glsa-200509-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-16">
<title>Mantis: XSS and SQL injection vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) vulnerabilities.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>September 24, 2005</announced>
- <revised>September 24, 2005: 01</revised>
+ <announced>2005-09-24</announced>
+ <revised>2005-09-24: 01</revised>
<bug>103308</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2556">CAN-2005-2556</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2557">CAN-2005-2557</uri>
- <uri link="http://secunia.com/advisories/16506/">Secunia Advisory SA16506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2556">CAN-2005-2556</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2557">CAN-2005-2557</uri>
+ <uri link="https://secunia.com/advisories/16506/">Secunia Advisory SA16506</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Sep 2005 12:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-09-23T12:20:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:21:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:21:10Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-17.xml b/glsa-200509-17.xml
index df15ad47..084bb564 100644
--- a/glsa-200509-17.xml
+++ b/glsa-200509-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-17">
<title>Webmin, Usermin: Remote code execution through PAM authentication</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Webmin Usermin</product>
- <announced>September 24, 2005</announced>
- <revised>September 24, 2005: 01</revised>
+ <announced>2005-09-24</announced>
+ <revised>2005-09-24: 01</revised>
<bug>106705</bug>
<access>remote</access>
<affected>
@@ -58,22 +57,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.230&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.230"</code>
<p>
All Usermin users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/usermin-1.160&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/usermin-1.160"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3042">CAN-2005-3042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3042">CAN-2005-3042</uri>
<uri link="http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Sep 2005 12:50:05 +0000">
+ <metadata tag="submitter" timestamp="2005-09-23T12:50:05Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:50:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:50:25Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-18.xml b/glsa-200509-18.xml
index 8db1bf57..0b611e57 100644
--- a/glsa-200509-18.xml
+++ b/glsa-200509-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-18">
<title>Qt: Buffer overflow in the included zlib library</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>September 26, 2005</announced>
- <revised>September 26, 2005: 02</revised>
+ <announced>2005-09-26</announced>
+ <revised>2005-09-26: 02</revised>
<bug>105695</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.4-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.4-r8"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 22 Sep 2005 16:49:17 +0000">
+ <metadata tag="submitter" timestamp="2005-09-22T16:49:17Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:32:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:32:05Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-19.xml b/glsa-200509-19.xml
index b884de3d..30274bbd 100644
--- a/glsa-200509-19.xml
+++ b/glsa-200509-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-19">
<title>PHP: Vulnerabilities in included PCRE and XML-RPC libraries</title>
<synopsis>
@@ -9,8 +8,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>September 27, 2005</announced>
- <revised>September 27, 2005: 01</revised>
+ <announced>2005-09-27</announced>
+ <revised>2005-09-27: 01</revised>
<bug>102373</bug>
<access>remote</access>
<affected>
@@ -81,15 +80,15 @@
# emerge --ask --oneshot --verbose dev-php/php-cgi</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
- <uri link="/security/en/glsa/glsa-200508-13.xml">GLSA 200508-13</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-13.xml">GLSA 200508-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2005 15:50:10 +0000">
+ <metadata tag="submitter" timestamp="2005-09-26T15:50:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Sep 2005 07:58:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-27T07:58:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200509-20.xml b/glsa-200509-20.xml
index 3228b85e..3f8b5898 100644
--- a/glsa-200509-20.xml
+++ b/glsa-200509-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-20">
<title>AbiWord: RTF import stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
making it vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">AbiWord</product>
- <announced>September 30, 2005</announced>
- <revised>September 30, 2005: 01</revised>
+ <announced>2005-09-30</announced>
+ <revised>2005-09-30: 01</revised>
<bug>107351</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/abiword-2.2.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2964">CAN-2005-2964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2964">CAN-2005-2964</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Sep 2005 16:02:24 +0000">
+ <metadata tag="requester" timestamp="2005-09-28T16:02:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Sep 2005 12:13:23 +0000">
+ <metadata tag="submitter" timestamp="2005-09-29T12:13:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Sep 2005 20:47:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-29T20:47:05Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200509-21.xml b/glsa-200509-21.xml
index 270185c8..8d46ac80 100644
--- a/glsa-200509-21.xml
+++ b/glsa-200509-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-21">
<title>Hylafax: Insecure temporary file creation in xferfaxstats script</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">hylafax</product>
- <announced>September 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>106882</bug>
<access>local</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-misc/hylafax</code>
</resolution>
<references>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384">Original bug report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3069">CVE-2005-3069</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384">Original bug report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3069">CVE-2005-3069</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Sep 2005 15:24:43 +0000">
+ <metadata tag="requester" timestamp="2005-09-28T15:24:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Sep 2005 19:07:36 +0000">
+ <metadata tag="submitter" timestamp="2005-09-28T19:07:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 30 Sep 2005 07:45:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-30T07:45:48Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-01.xml b/glsa-200510-01.xml
index 6d6bb803..a62831d2 100644
--- a/glsa-200510-01.xml
+++ b/glsa-200510-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-01">
<title>gtkdiskfree: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">gtkdiskfree</product>
- <announced>October 03, 2005</announced>
- <revised>October 03, 2005: 01</revised>
+ <announced>2005-10-03</announced>
+ <revised>2005-10-03: 01</revised>
<bug>104565</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/gtkdiskfree-1.9.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/gtkdiskfree-1.9.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2918">CAN-2005-2918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2918">CAN-2005-2918</uri>
<uri link="http://www.zataz.net/adviso/gtkdiskfree-09052005.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 03 Oct 2005 07:42:10 +0000">
+ <metadata tag="submitter" timestamp="2005-10-03T07:42:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 03 Oct 2005 07:42:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-03T07:42:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-02.xml b/glsa-200510-02.xml
index 51b9f347..5f5f9047 100644
--- a/glsa-200510-02.xml
+++ b/glsa-200510-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-02">
<title>Berkeley MPEG Tools: Multiple insecure temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">MPEG Tools</product>
- <announced>October 03, 2005</announced>
- <revised>October 03, 2005: 01</revised>
+ <announced>2005-10-03</announced>
+ <revised>2005-10-03: 01</revised>
<bug>107344</bug>
<access>local</access>
<affected>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mpeg-tools-1.5b-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mpeg-tools-1.5b-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3115">CAN-2005-3115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3115">CAN-2005-3115</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Sep 2005 07:41:47 +0000">
+ <metadata tag="requester" timestamp="2005-09-30T07:41:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Oct 2005 09:55:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-01T09:55:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Oct 2005 13:13:54 +0000">
+ <metadata tag="submitter" timestamp="2005-10-02T13:13:54Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-03.xml b/glsa-200510-03.xml
index 2e9a8ab7..e6d13be7 100644
--- a/glsa-200510-03.xml
+++ b/glsa-200510-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-03">
<title>Uim: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation vulnerability.
</synopsis>
<product type="ebuild">uim</product>
- <announced>October 04, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>107748</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-0.4.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/uim-0.4.9.1"</code>
</resolution>
<references>
- <uri link="http://lists.freedesktop.org/pipermail/uim/2005-September/001346.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3149">CVE-2005-3149</uri>
+ <uri link="https://lists.freedesktop.org/pipermail/uim/2005-September/001346.html">Original advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3149">CVE-2005-3149</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Oct 2005 13:02:25 +0000">
+ <metadata tag="requester" timestamp="2005-10-02T13:02:25Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Oct 2005 13:02:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-02T13:02:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 03 Oct 2005 09:56:44 +0000">
+ <metadata tag="submitter" timestamp="2005-10-03T09:56:44Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200510-04.xml b/glsa-200510-04.xml
index ee67cc9c..82731dca 100644
--- a/glsa-200510-04.xml
+++ b/glsa-200510-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-04">
<title>Texinfo: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">Texinfo</product>
- <announced>October 05, 2005</announced>
- <revised>October 05, 2005: 01</revised>
+ <announced>2005-10-05</announced>
+ <revised>2005-10-05: 01</revised>
<bug>106105</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/texinfo-4.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/texinfo-4.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3011">CAN-2005-3011</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3011">CAN-2005-3011</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Sep 2005 14:54:06 +0000">
+ <metadata tag="requester" timestamp="2005-09-29T14:54:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Sep 2005 19:15:57 +0000">
+ <metadata tag="submitter" timestamp="2005-09-29T19:15:57Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Oct 2005 09:53:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-01T09:53:58Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-05.xml b/glsa-200510-05.xml
index 70e68145..ec1951db 100644
--- a/glsa-200510-05.xml
+++ b/glsa-200510-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-05">
<title>Ruby: Security bypass vulnerability</title>
<synopsis>
Ruby is vulnerable to a security bypass of the safe level mechanism.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>October 06, 2005</announced>
- <revised>October 06, 2005: 01</revised>
+ <announced>2005-10-06</announced>
+ <revised>2005-10-06: 01</revised>
<bug>106996</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2337">CAN-2005-2337</uri>
- <uri link="http://www.ruby-lang.org/en/20051003.html">Ruby release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2337">CAN-2005-2337</uri>
+ <uri link="https://www.ruby-lang.org/en/20051003.html">Ruby release announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Oct 2005 12:55:13 +0000">
+ <metadata tag="requester" timestamp="2005-10-04T12:55:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Oct 2005 12:55:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-04T12:55:25Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 18:17:21 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T18:17:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200510-06.xml b/glsa-200510-06.xml
index b6632aa6..a27d285f 100644
--- a/glsa-200510-06.xml
+++ b/glsa-200510-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-06">
<title>Dia: Arbitrary code execution through SVG import</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>October 06, 2005</announced>
- <revised>October 06, 2005: 01</revised>
+ <announced>2005-10-06</announced>
+ <revised>2005-10-06: 01</revised>
<bug>107916</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.94-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2966">CAN-2005-2966</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2966">CAN-2005-2966</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Oct 2005 12:58:56 +0000">
+ <metadata tag="requester" timestamp="2005-10-04T12:58:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 18:51:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T18:51:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Oct 2005 07:39:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-05T07:39:21Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-07.xml b/glsa-200510-07.xml
index c9929b99..880eb3b4 100644
--- a/glsa-200510-07.xml
+++ b/glsa-200510-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-07">
<title>RealPlayer, Helix Player: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">realplayer helixplayer</product>
- <announced>October 07, 2005</announced>
- <revised>November 22, 2005: 02</revised>
+ <announced>2005-10-07</announced>
+ <revised>2005-11-22: 02</revised>
<bug>107309</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.6"</code>
<p>
Note to Helix Player users: There is currently no stable secure Helix
Player package. Affected users should remove the package until an
@@ -60,15 +59,15 @@
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2710">CAN-2005-2710</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2710">CAN-2005-2710</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Oct 2005 10:35:35 +0000">
+ <metadata tag="requester" timestamp="2005-10-01T10:35:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 19:39:34 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T19:39:34Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 14:20:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T14:20:23Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-08.xml b/glsa-200510-08.xml
index ec041684..c2f19aba 100644
--- a/glsa-200510-08.xml
+++ b/glsa-200510-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-08">
<title>xine-lib: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>October 08, 2005</announced>
- <revised>October 08, 2005: 01</revised>
+ <announced>2005-10-08</announced>
+ <revised>2005-10-08: 01</revised>
<bug>107854</bug>
<access>remote</access>
<affected>
@@ -55,12 +54,12 @@
# emerge --ask --oneshot --verbose media-libs/xine-lib</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2967">CAN-2005-2967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2967">CAN-2005-2967</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 07 Oct 2005 11:30:51 +0000">
+ <metadata tag="submitter" timestamp="2005-10-07T11:30:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Oct 2005 16:01:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-08T16:01:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200510-09.xml b/glsa-200510-09.xml
index 074cfa30..78272be2 100644
--- a/glsa-200510-09.xml
+++ b/glsa-200510-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-09">
<title>Weex: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
servers to execute arbitrary code.
</synopsis>
<product type="ebuild">Weex</product>
- <announced>October 08, 2005</announced>
- <revised>October 08, 2005: 01</revised>
+ <announced>2005-10-08</announced>
+ <revised>2005-10-08: 01</revised>
<bug>107849</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/weex-2.6.1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/weex-2.6.1.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3150">CAN-2005-3150</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3150">CAN-2005-3150</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 07 Oct 2005 11:45:52 +0000">
+ <metadata tag="submitter" timestamp="2005-10-07T11:45:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 11:46:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T11:46:02Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-10.xml b/glsa-200510-10.xml
index b7d8a200..34fd03a9 100644
--- a/glsa-200510-10.xml
+++ b/glsa-200510-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-10">
<title>uw-imap: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">uw-imap</product>
- <announced>October 11, 2005</announced>
- <revised>October 11, 2005: 01</revised>
+ <announced>2005-10-11</announced>
+ <revised>2005-10-11: 01</revised>
<bug>108206</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2004g&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2004g"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933">CAN-2005-2933</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933">CAN-2005-2933</uri>
<uri link="http://www.idefense.com/application/poi/display?id=313&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2005 11:49:05 +0000">
+ <metadata tag="requester" timestamp="2005-10-07T11:49:05Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 15:06:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T15:06:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Oct 2005 06:13:24 +0000">
+ <metadata tag="submitter" timestamp="2005-10-08T06:13:24Z">
r2d2
</metadata>
</glsa>
diff --git a/glsa-200510-11.xml b/glsa-200510-11.xml
index 070e070a..bab0ad1e 100644
--- a/glsa-200510-11.xml
+++ b/glsa-200510-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-11">
<title>OpenSSL: SSL 2.0 protocol rollback</title>
<synopsis>
@@ -8,8 +7,8 @@
secure SSL 2.0 protocol.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>October 12, 2005</announced>
- <revised>November 07, 2005: 02</revised>
+ <announced>2005-10-12</announced>
+ <revised>2005-11-07: 02</revised>
<bug>108852</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
# emerge --ask --oneshot --verbose dev-libs/openssl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969">CAN-2005-2969</uri>
- <uri link="http://www.openssl.org/news/secadv_20051011.txt ">OpenSSL security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969">CAN-2005-2969</uri>
+ <uri link="https://www.openssl.org/news/secadv_20051011.txt ">OpenSSL security advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2005 07:50:27 +0000">
+ <metadata tag="requester" timestamp="2005-10-11T07:50:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2005 08:03:33 +0000">
+ <metadata tag="submitter" timestamp="2005-10-11T08:03:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Oct 2005 07:47:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-12T07:47:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-12.xml b/glsa-200510-12.xml
index 86a53c35..0a818ea4 100644
--- a/glsa-200510-12.xml
+++ b/glsa-200510-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-12">
<title>KOffice, KWord: RTF import buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">koffice, kword</product>
- <announced>October 14, 2005</announced>
- <revised>October 14, 2005: 01</revised>
+ <announced>2005-10-14</announced>
+ <revised>2005-10-14: 01</revised>
<bug>108411</bug>
<access>remote</access>
<affected>
@@ -52,22 +51,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.4.1-r1"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2971">CAN-2005-2971</uri>
- <uri link="http://www.kde.org/info/security/advisory-20051011-1.txt">KDE Security Advisory: KWord RTF import buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2971">CAN-2005-2971</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20051011-1.txt">KDE Security Advisory: KWord RTF import buffer overflow</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2005 14:40:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-11T14:40:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Oct 2005 05:26:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-14T05:26:32Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200510-13.xml b/glsa-200510-13.xml
index 121f11d9..c187155a 100644
--- a/glsa-200510-13.xml
+++ b/glsa-200510-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-13">
<title>SPE: Insecure file permissions</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">spe</product>
- <announced>October 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>108538</bug>
<access>local</access>
<affected>
@@ -51,15 +50,15 @@
# emerge --ask --oneshot --verbose dev-util/spe</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3291">CVE-2005-3291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3291">CVE-2005-3291</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2005 21:00:30 +0000">
+ <metadata tag="requester" timestamp="2005-10-11T21:00:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Oct 2005 02:02:14 +0000">
+ <metadata tag="submitter" timestamp="2005-10-12T02:02:14Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Oct 2005 08:06:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-15T08:06:19Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-14.xml b/glsa-200510-14.xml
index d53181a6..62112839 100644
--- a/glsa-200510-14.xml
+++ b/glsa-200510-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-14">
<title>Perl, Qt-UnixODBC, CMake: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">Perl Qt-UnixODBC CMake</product>
- <announced>October 17, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-10-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>105719</bug>
<bug>105721</bug>
<bug>106678</bug>
@@ -70,7 +69,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/qt-unixODBC-3.3.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/qt-unixODBC-3.3.4-r1"</code>
<p>
All CMake users should upgrade to the latest version:
</p>
@@ -79,17 +78,17 @@
# emerge --ask --oneshot --verbose dev-util/cmake</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4278">CVE-2005-4278</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4279">CVE-2005-4279</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4280">CVE-2005-4280</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4278">CVE-2005-4278</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4279">CVE-2005-4279</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4280">CVE-2005-4280</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Sep 2005 08:00:50 +0000">
+ <metadata tag="requester" timestamp="2005-09-27T08:00:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2005 08:34:31 +0000">
+ <metadata tag="submitter" timestamp="2005-10-10T08:34:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Oct 2005 10:08:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-15T10:08:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-15.xml b/glsa-200510-15.xml
index cd4ff86b..191ef6e2 100644
--- a/glsa-200510-15.xml
+++ b/glsa-200510-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-15">
<title>Lynx: Buffer overflow in NNTP processing</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">Lynx</product>
- <announced>October 17, 2005</announced>
- <revised>October 17, 2005: 01</revised>
+ <announced>2005-10-17</announced>
+ <revised>2005-10-17: 01</revised>
<bug>108451</bug>
<access>remote</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3120">CAN-2005-3120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3120">CAN-2005-3120</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 09:30:52 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T09:30:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Oct 2005 12:46:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-17T12:46:58Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-16.xml b/glsa-200510-16.xml
index aa2df98d..7395ab24 100644
--- a/glsa-200510-16.xml
+++ b/glsa-200510-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-16">
<title>phpMyAdmin: Local file inclusion vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>October 17, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>108939</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.4_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.4_p2"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4">PMASA-2005-4</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299">CVE-2005-3299</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4">PMASA-2005-4</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299">CVE-2005-3299</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Oct 2005 08:08:40 +0000">
+ <metadata tag="requester" timestamp="2005-10-15T08:08:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 16 Oct 2005 19:41:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-16T19:41:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Oct 2005 03:54:58 +0000">
+ <metadata tag="submitter" timestamp="2005-10-17T03:54:58Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200510-17.xml b/glsa-200510-17.xml
index c2a21927..87f82b36 100644
--- a/glsa-200510-17.xml
+++ b/glsa-200510-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-17">
<title>AbiWord: New RTF import buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
import, making it vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">AbiWord</product>
- <announced>October 20, 2005</announced>
- <revised>October 20, 2005: 01</revised>
+ <announced>2005-10-20</announced>
+ <revised>2005-10-20: 01</revised>
<bug>109157</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/abiword-2.2.11"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200509-20.xml">GLSA-200509-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2972">CAN-2005-2972</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200509-20.xml">GLSA-200509-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2972">CAN-2005-2972</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Oct 2005 07:36:44 +0000">
+ <metadata tag="requester" timestamp="2005-10-18T07:36:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Oct 2005 14:22:32 +0000">
+ <metadata tag="submitter" timestamp="2005-10-18T14:22:32Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Oct 2005 05:41:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-20T05:41:16Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200510-18.xml b/glsa-200510-18.xml
index 5dc29e79..31402e77 100644
--- a/glsa-200510-18.xml
+++ b/glsa-200510-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-18">
<title>Netpbm: Buffer overflow in pnmtopng</title>
<synopsis>
@@ -8,8 +7,8 @@
which can potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>October 20, 2005</announced>
- <revised>May 28, 2009: 06</revised>
+ <announced>2005-10-20</announced>
+ <revised>2009-05-28: 06</revised>
<bug>109705</bug>
<access>remote</access>
<affected>
@@ -62,12 +61,12 @@
# emerge --ask --oneshot --verbose media-libs/netpbm</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2978">CAN-2005-2978</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2978">CAN-2005-2978</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 09:38:18 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T09:38:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Oct 2005 07:38:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-20T07:38:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-19.xml b/glsa-200510-19.xml
index a102d105..5919447d 100644
--- a/glsa-200510-19.xml
+++ b/glsa-200510-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-19">
<title>cURL: NTLM username stack overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>October 22, 2005</announced>
- <revised>October 22, 2005: 01</revised>
+ <announced>2005-10-22</announced>
+ <revised>2005-10-22: 01</revised>
<bug>109097</bug>
<access>remote</access>
<affected>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185">CVE-2005-3185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185">CVE-2005-3185</uri>
<uri link="http://www.idefense.com/application/poi/display?id=322&amp;type=vulnerabilities">iDefense Security Advisory 10.13.05</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 21 Oct 2005 09:04:01 +0000">
+ <metadata tag="submitter" timestamp="2005-10-21T09:04:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Oct 2005 09:04:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-21T09:04:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-20.xml b/glsa-200510-20.xml
index 996f84d6..c15fda05 100644
--- a/glsa-200510-20.xml
+++ b/glsa-200510-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-20">
<title>Zope: File inclusion through RestructuredText</title>
<synopsis>
@@ -8,8 +7,8 @@
RestructuredText functionalities to untrusted users.
</synopsis>
<product type="ebuild">Zope</product>
- <announced>October 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109087</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
</resolution>
<references>
<uri link="http://www.zope.org/Products/Zope/Hotfix_2005-10-09/security_alert">Zope Hotfix 2005-10-09 Alert</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3323">CVE-2005-3323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3323">CVE-2005-3323</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Oct 2005 15:36:29 +0000">
+ <metadata tag="requester" timestamp="2005-10-20T15:36:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Oct 2005 15:31:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-23T15:31:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Oct 2005 16:31:59 +0000">
+ <metadata tag="submitter" timestamp="2005-10-23T16:31:59Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-21.xml b/glsa-200510-21.xml
index e7c7719b..f835c9db 100644
--- a/glsa-200510-21.xml
+++ b/glsa-200510-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-21">
<title>phpMyAdmin: Local file inclusion and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
issues.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>October 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>110146</bug>
<access>local and remote</access>
<affected>
@@ -56,17 +55,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.4_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.4_p3"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5">PMASA-2005-5</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300">CVE-2005-3300</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301">CVE-2005-3301</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5">PMASA-2005-5</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300">CVE-2005-3300</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301">CVE-2005-3301</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 24 Oct 2005 08:28:30 +0000">
+ <metadata tag="submitter" timestamp="2005-10-24T08:28:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Oct 2005 08:03:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-25T08:03:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-22.xml b/glsa-200510-22.xml
index a3821621..9a6e1211 100644
--- a/glsa-200510-22.xml
+++ b/glsa-200510-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-22">
<title>SELinux PAM: Local password guessing attack</title>
<synopsis>
@@ -8,8 +7,8 @@
brute-force system passwords.
</synopsis>
<product type="ebuild">PAM</product>
- <announced>October 28, 2005</announced>
- <revised>October 28, 2005: 01</revised>
+ <announced>2005-10-28</announced>
+ <revised>2005-10-28: 01</revised>
<bug>109485</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/pam-0.78-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/pam-0.78-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2977">CVE-2005-2977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2977">CVE-2005-2977</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Oct 2005 15:44:45 +0000">
+ <metadata tag="requester" timestamp="2005-10-26T15:44:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Oct 2005 07:49:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-27T07:49:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Oct 2005 12:12:27 +0000">
+ <metadata tag="submitter" timestamp="2005-10-27T12:12:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-23.xml b/glsa-200510-23.xml
index 0cf8291c..e811987a 100644
--- a/glsa-200510-23.xml
+++ b/glsa-200510-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-23">
<title>TikiWiki: XSS vulnerability</title>
<synopsis>
TikiWiki is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>October 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109858</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.1.1"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3283">CVE-2005-3283</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3283">CVE-2005-3283</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Oct 2005 19:43:33 +0000">
+ <metadata tag="submitter" timestamp="2005-10-26T19:43:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Oct 2005 18:43:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-27T18:43:45Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200510-24.xml b/glsa-200510-24.xml
index 876c266c..6ba2621d 100644
--- a/glsa-200510-24.xml
+++ b/glsa-200510-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-24">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure to arbitrary script execution.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>October 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>110326</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.3"</code>
</resolution>
<references>
- <uri link="http://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335">CVE-2005-3335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336">CVE-2005-3336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3337">CVE-2005-3337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338">CVE-2005-3338</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3339">CVE-2005-3339</uri>
+ <uri link="https://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335">CVE-2005-3335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336">CVE-2005-3336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3337">CVE-2005-3337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338">CVE-2005-3338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3339">CVE-2005-3339</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Oct 2005 05:38:14 +0000">
+ <metadata tag="submitter" timestamp="2005-10-26T05:38:14Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Oct 2005 05:38:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-26T05:38:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200510-25.xml b/glsa-200510-25.xml
index 09939cd8..d8724e94 100644
--- a/glsa-200510-25.xml
+++ b/glsa-200510-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-25">
<title>Ethereal: Multiple vulnerabilities in protocol dissectors</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>October 30, 2005</announced>
- <revised>October 30, 2005: 01</revised>
+ <announced>2005-10-30</announced>
+ <revised>2005-10-30: 01</revised>
<bug>109348</bug>
<access>remote</access>
<affected>
@@ -60,26 +59,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184">CVE-2005-3184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241">CVE-2005-3241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242">CVE-2005-3242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243">CVE-2005-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244">CVE-2005-3244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245">CVE-2005-3245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246">CVE-2005-3246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247">CVE-2005-3247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248">CVE-2005-3248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249">CVE-2005-3249</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313">CVE-2005-3313</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184">CVE-2005-3184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241">CVE-2005-3241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242">CVE-2005-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243">CVE-2005-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244">CVE-2005-3244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245">CVE-2005-3245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246">CVE-2005-3246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247">CVE-2005-3247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248">CVE-2005-3248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249">CVE-2005-3249</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313">CVE-2005-3313</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00021.html">Ethereal enpa-sa-00021</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 17 Oct 2005 05:29:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-17T05:29:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 09:10:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T09:10:32Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200510-26.xml b/glsa-200510-26.xml
index 9caa1d54..fe2e85f3 100644
--- a/glsa-200510-26.xml
+++ b/glsa-200510-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-26">
<title>XLI, Xloadimage: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xli xloadimage</product>
- <announced>October 30, 2005</announced>
- <revised>October 30, 2005: 01</revised>
+ <announced>2005-10-30</announced>
+ <revised>2005-10-30: 01</revised>
<bug>108365</bug>
<access>remote</access>
<affected>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xli-1.17.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xli-1.17.0-r2"</code>
<p>
All Xloadimage users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xloadimage-4.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xloadimage-4.1-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178">CAN-2005-3178</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178">CAN-2005-3178</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Oct 2005 15:18:40 +0000">
+ <metadata tag="requester" timestamp="2005-10-26T15:18:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Oct 2005 03:10:06 +0000">
+ <metadata tag="submitter" timestamp="2005-10-28T03:10:06Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 15:11:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T15:11:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-01.xml b/glsa-200511-01.xml
index a486e071..6a4846ee 100644
--- a/glsa-200511-01.xml
+++ b/glsa-200511-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-01">
<title>libgda: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libgda</product>
- <announced>November 02, 2005</announced>
- <revised>November 02, 2005: 01</revised>
+ <announced>2005-11-02</announced>
+ <revised>2005-11-02: 01</revised>
<bug>110467</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/libgda-1.2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/libgda-1.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958">CVE-2005-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958">CVE-2005-2958</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Oct 2005 15:09:20 +0000">
+ <metadata tag="requester" timestamp="2005-10-30T15:09:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 15:09:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T15:09:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2005 13:44:10 +0000">
+ <metadata tag="submitter" timestamp="2005-11-01T13:44:10Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-02.xml b/glsa-200511-02.xml
index 55f8f160..cf3ab8de 100644
--- a/glsa-200511-02.xml
+++ b/glsa-200511-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-02">
<title>QDBM, ImageMagick, GDAL: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">QDBM ImageMagick GDAL</product>
- <announced>November 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105717</bug>
<bug>105760</bug>
<bug>108534</bug>
@@ -63,13 +62,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/qdbm-1.8.33-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/qdbm-1.8.33-r2"</code>
<p>
All ImageMagick users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.4.2-r1"</code>
<p>
All GDAL users should upgrade to the latest version:
</p>
@@ -78,14 +77,14 @@
# emerge --ask --oneshot --verbose sci-libs/gdal</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3580">CVE-2005-3580</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3581">CVE-2005-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3582">CVE-2005-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3580">CVE-2005-3580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3581">CVE-2005-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3582">CVE-2005-3582</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 10:06:06 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T10:06:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Nov 2005 13:10:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-01T13:10:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-03.xml b/glsa-200511-03.xml
index 9ddf1b00..045c52c6 100644
--- a/glsa-200511-03.xml
+++ b/glsa-200511-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-03">
<title>giflib: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code execution.
</synopsis>
<product type="ebuild">giflib</product>
- <announced>November 04, 2005</announced>
- <revised>November 04, 2005: 01</revised>
+ <announced>2005-11-04</announced>
+ <revised>2005-11-04: 01</revised>
<bug>109997</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/giflib-4.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/giflib-4.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974">CVE-2005-2974</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350">CVE-2005-3350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974">CVE-2005-2974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350">CVE-2005-3350</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Oct 2005 09:30:14 +0000">
+ <metadata tag="requester" timestamp="2005-10-29T09:30:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Nov 2005 12:50:36 +0000">
+ <metadata tag="submitter" timestamp="2005-11-02T12:50:36Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Nov 2005 08:45:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-04T08:45:23Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-04.xml b/glsa-200511-04.xml
index 140fd276..f68bcdb7 100644
--- a/glsa-200511-04.xml
+++ b/glsa-200511-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-04">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>November 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109213</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.87.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.87.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3239">CAN-2005-3239</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303">CAN-2005-3303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500">CVE-2005-3500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501">CVE-2005-3501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3587">CVE-2005-3587</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=368319">ClamAV release notes</uri>
- <uri link="http://www.zerodayinitiative.com/advisories/ZDI-05-002.html">Zero Day Initiative advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3239">CAN-2005-3239</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303">CAN-2005-3303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500">CVE-2005-3500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501">CVE-2005-3501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3587">CVE-2005-3587</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=368319">ClamAV release notes</uri>
+ <uri link="https://www.zerodayinitiative.com/advisories/ZDI-05-002.html">Zero Day Initiative advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Nov 2005 08:33:36 +0000">
+ <metadata tag="requester" timestamp="2005-11-04T08:33:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 15:17:11 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T15:17:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Nov 2005 14:23:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-06T14:23:05Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-05.xml b/glsa-200511-05.xml
index a38eba12..70581a63 100644
--- a/glsa-200511-05.xml
+++ b/glsa-200511-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-05">
<title>GNUMP3d: Directory traversal and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
browser.
</synopsis>
<product type="ebuild">gnump3d</product>
- <announced>November 06, 2005</announced>
- <revised>August 21, 2007: 02</revised>
+ <announced>2005-11-06</announced>
+ <revised>2007-08-21: 02</revised>
<bug>109667</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/gnump3d-2.9_pre7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/gnump3d-2.9_pre7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123">CVE-2005-3123</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424">CVE-2005-3424</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425">CVE-2005-3425</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123">CVE-2005-3123</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424">CVE-2005-3424</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425">CVE-2005-3425</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Nov 2005 12:32:56 +0000">
+ <metadata tag="requester" timestamp="2005-11-03T12:32:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 13:55:23 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T13:55:23Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Nov 2005 08:54:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-05T08:54:39Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-06.xml b/glsa-200511-06.xml
index 67ff8f87..11c6f49f 100644
--- a/glsa-200511-06.xml
+++ b/glsa-200511-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-06">
<title>fetchmail: Password exposure in fetchmailconf</title>
<synopsis>
@@ -8,8 +7,8 @@
exposing sensitive information to other local users.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>November 06, 2005</announced>
- <revised>November 06, 2005: 01</revised>
+ <announced>2005-11-06</announced>
+ <revised>2005-11-06: 01</revised>
<bug>110366</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.2.5.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.2.5.2-r1"</code>
</resolution>
<references>
<uri link="http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt">Fetchmail Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 12:31:43 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T12:31:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Nov 2005 12:31:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-04T12:31:54Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-07.xml b/glsa-200511-07.xml
index 64c36820..74c8cfa3 100644
--- a/glsa-200511-07.xml
+++ b/glsa-200511-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-07">
<title>OpenVPN: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code and the OpenVPN server is vulnerable to a Denial of Service issue.
</synopsis>
<product type="ebuild">OpenVPN</product>
- <announced>November 06, 2005</announced>
- <revised>November 06, 2005: 01</revised>
+ <announced>2005-11-06</announced>
+ <revised>2005-11-06: 01</revised>
<bug>111116</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openvpn-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openvpn-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393">CVE-2005-3393</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409">CVE-2005-3409</uri>
- <uri link="http://openvpn.net/changelog.html">OpenVPN changelog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393">CVE-2005-3393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409">CVE-2005-3409</uri>
+ <uri link="https://openvpn.net/changelog.html">OpenVPN changelog</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Nov 2005 12:34:18 +0000">
+ <metadata tag="requester" timestamp="2005-11-02T12:34:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 13:01:51 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T13:01:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Nov 2005 14:23:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-06T14:23:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-08.xml b/glsa-200511-08.xml
index 7b7f495d..de2f94d4 100644
--- a/glsa-200511-08.xml
+++ b/glsa-200511-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-08">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local Denial of service, cross-site scripting or PHP variables overwrite.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>107602</bug>
<bug>111032</bug>
<access>remote and local</access>
@@ -99,18 +98,18 @@
# emerge --ask --oneshot --verbose dev-php/php-cgi</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054">CVE-2005-3054</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319">CVE-2005-3319</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388">CVE-2005-3388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389">CVE-2005-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390">CVE-2005-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391">CVE-2005-3391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392">CVE-2005-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054">CVE-2005-3054</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319">CVE-2005-3319</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388">CVE-2005-3388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389">CVE-2005-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390">CVE-2005-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391">CVE-2005-3391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392">CVE-2005-3392</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Nov 2005 14:11:50 +0000">
+ <metadata tag="submitter" timestamp="2005-11-07T14:11:50Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Nov 2005 14:44:31 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-13T14:44:31Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200511-09.xml b/glsa-200511-09.xml
index 3193f8a9..85f88657 100644
--- a/glsa-200511-09.xml
+++ b/glsa-200511-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-09">
<title>Lynx: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands.
</synopsis>
<product type="ebuild">lynx</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>112213</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.5-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
<uri link="http://www.idefense.com/application/poi/display?id=338&amp;type=vulnerabilities">iDefense Security Advisory 11.11.05</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2005 20:17:54 +0000">
+ <metadata tag="requester" timestamp="2005-11-11T20:17:54Z">
taviso
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Nov 2005 21:30:52 +0000">
+ <metadata tag="submitter" timestamp="2005-11-11T21:30:52Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Nov 2005 17:03:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-13T17:03:02Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-10.xml b/glsa-200511-10.xml
index e29eb2a0..a53a5636 100644
--- a/glsa-200511-10.xml
+++ b/glsa-200511-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-10">
<title>RAR: Format string and buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may be used to execute arbitrary code.
</synopsis>
<product type="ebuild">rar</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>111926</bug>
<access>remote</access>
<affected>
@@ -63,19 +62,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rar-3.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rar-3.5.1"</code>
</resolution>
<references>
<uri link="http://www.rarlabs.com/rarnew.htm">RAR Release Notes</uri>
- <uri link="http://secunia.com/secunia_research/2005-53/advisory/">Secunia Research 11/10/2005</uri>
+ <uri link="https://secunia.com/secunia_research/2005-53/advisory/">Secunia Research 11/10/2005</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2005 09:12:31 +0000">
+ <metadata tag="requester" timestamp="2005-11-11T09:12:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Nov 2005 14:35:09 +0000">
+ <metadata tag="submitter" timestamp="2005-11-11T14:35:09Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Nov 2005 14:35:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-11T14:35:22Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200511-11.xml b/glsa-200511-11.xml
index 4af034f0..d65cb260 100644
--- a/glsa-200511-11.xml
+++ b/glsa-200511-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-11">
<title>linux-ftpd-ssl: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code with escalated privileges on the local system.
</synopsis>
<product type="ebuild">linux-ftpd-ssl</product>
- <announced>November 13, 2005</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2005-11-13</announced>
+ <revised>2007-12-30: 02</revised>
<bug>111573</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3524">CVE-2005-3524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3524">CVE-2005-3524</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Nov 2005 18:51:48 +0000">
+ <metadata tag="requester" timestamp="2005-11-06T18:51:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Nov 2005 21:31:18 +0000">
+ <metadata tag="submitter" timestamp="2005-11-06T21:31:18Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Nov 2005 21:51:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-12T21:51:01Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200511-12.xml b/glsa-200511-12.xml
index 35ac66b1..716ebb66 100644
--- a/glsa-200511-12.xml
+++ b/glsa-200511-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-12">
<title>Scorched 3D: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
service or execute arbitrary code on game servers.
</synopsis>
<product type="ebuild">scorched3d</product>
- <announced>November 15, 2005</announced>
- <revised>August 10, 2006: 03</revised>
+ <announced>2005-11-15</announced>
+ <revised>2006-08-10: 03</revised>
<bug>111421</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/scorched3d-40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/scorched3d-40"</code>
</resolution>
<references>
<uri link="http://seclists.org/lists/fulldisclosure/2005/Nov/0079.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3486">CVE-2005-3486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3487">CVE-2005-3487</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3488">CVE-2005-3488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3486">CVE-2005-3486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3487">CVE-2005-3487</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3488">CVE-2005-3488</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Nov 2005 13:02:43 +0000">
+ <metadata tag="submitter" timestamp="2005-11-14T13:02:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Nov 2005 13:04:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-14T13:04:09Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-13.xml b/glsa-200511-13.xml
index 5c01d111..479d57c4 100644
--- a/glsa-200511-13.xml
+++ b/glsa-200511-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-13">
<title>Sylpheed, Sylpheed-Claws: Buffer overflow in LDIF importer</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">sylpheed sylpheed-claws</product>
- <announced>November 15, 2005</announced>
- <revised>November 15, 2005: 01</revised>
+ <announced>2005-11-15</announced>
+ <revised>2005-11-15: 01</revised>
<bug>111853</bug>
<access>remote</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-2.0.4"</code>
<p>
All Sylpheed-Claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.5-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3354">CVE-2005-3354</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3354">CVE-2005-3354</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Nov 2005 17:42:22 +0000">
+ <metadata tag="requester" timestamp="2005-11-13T17:42:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Nov 2005 18:10:25 +0000">
+ <metadata tag="submitter" timestamp="2005-11-13T18:10:25Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Nov 2005 08:35:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-15T08:35:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-14.xml b/glsa-200511-14.xml
index 9720f870..be9da5f0 100644
--- a/glsa-200511-14.xml
+++ b/glsa-200511-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-14">
<title>GTK+ 2, GdkPixbuf: Multiple XPM decoding vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gtk+</product>
- <announced>November 16, 2005</announced>
- <revised>November 16, 2005: 01</revised>
+ <announced>2005-11-16</announced>
+ <revised>2005-11-16: 01</revised>
<bug>112608</bug>
<access>remote</access>
<affected>
@@ -66,18 +65,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gdk-pixbuf-0.22.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gdk-pixbuf-0.22.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975">CVE-2005-2975</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976">CVE-2005-2976</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186">CVE-2005-3186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975">CVE-2005-2975</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976">CVE-2005-2976</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186">CVE-2005-3186</uri>
<uri link="http://www.idefense.com/application/poi/display?id=339&amp;type=vulnerabilities">iDefense Security Advisory 11.15.05</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Nov 2005 14:55:40 +0000">
+ <metadata tag="submitter" timestamp="2005-11-14T14:55:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 16 Nov 2005 12:54:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-16T12:54:54Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-15.xml b/glsa-200511-15.xml
index 1773b784..e490aae6 100644
--- a/glsa-200511-15.xml
+++ b/glsa-200511-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-15">
<title>Smb4k: Local unauthorized file access</title>
<synopsis>
@@ -8,8 +7,8 @@
contents of /etc/sudoers and /etc/super.tab files.
</synopsis>
<product type="ebuild">Smb4k</product>
- <announced>November 18, 2005</announced>
- <revised>November 18, 2005: 01</revised>
+ <announced>2005-11-18</announced>
+ <revised>2005-11-18: 01</revised>
<bug>111089</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/smb4k-0.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/smb4k-0.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2851">CVE-2005-2851</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2851">CVE-2005-2851</uri>
<uri link="http://smb4k.berlios.de/">Smb4k Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Nov 2005 09:03:00 +0000">
+ <metadata tag="requester" timestamp="2005-11-15T09:03:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Nov 2005 09:04:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-15T09:04:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Nov 2005 02:48:46 +0000">
+ <metadata tag="submitter" timestamp="2005-11-16T02:48:46Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200511-16.xml b/glsa-200511-16.xml
index cd4078c0..921370bf 100644
--- a/glsa-200511-16.xml
+++ b/glsa-200511-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-16">
<title>GNUMP3d: Directory traversal and insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
directory traversal and insecure temporary file creation.
</synopsis>
<product type="ebuild">GNUMP3d</product>
- <announced>November 21, 2005</announced>
- <revised>August 21, 2007: 02</revised>
+ <announced>2005-11-21</announced>
+ <revised>2007-08-21: 02</revised>
<bug>111990</bug>
<access>remote</access>
<affected>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/gnump3d-2.9_pre7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/gnump3d-2.9_pre7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3349">CVE-2005-3349</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3355">CVE-2005-3355</uri>
- <uri link="http://www.gnu.org/software/gnump3d/ChangeLog">GNUMP3d Changelog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3349">CVE-2005-3349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3355">CVE-2005-3355</uri>
+ <uri link="https://www.gnu.org/software/gnump3d/ChangeLog">GNUMP3d Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Nov 2005 12:35:13 +0000">
+ <metadata tag="requester" timestamp="2005-11-18T12:35:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Nov 2005 12:35:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-18T12:35:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Nov 2005 22:47:09 +0000">
+ <metadata tag="submitter" timestamp="2005-11-18T22:47:09Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200511-17.xml b/glsa-200511-17.xml
index 3b0c673b..bf5b088e 100644
--- a/glsa-200511-17.xml
+++ b/glsa-200511-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-17">
<title>FUSE: mtab corruption through fusermount</title>
<synopsis>
@@ -9,8 +8,8 @@
mount options.
</synopsis>
<product type="ebuild">FUSE</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112902</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/fuse-2.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/fuse-2.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531">CVE-2005-3531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531">CVE-2005-3531</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2005 12:06:35 +0000">
+ <metadata tag="requester" timestamp="2005-11-20T12:06:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 13:30:54 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T13:30:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 22 Nov 2005 16:07:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-22T16:07:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-18.xml b/glsa-200511-18.xml
index 78dbe89b..420e82a0 100644
--- a/glsa-200511-18.xml
+++ b/glsa-200511-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-18">
<title>phpSysInfo: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">phpsysinfo</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112482</bug>
<access>local and remote</access>
<affected>
@@ -55,20 +54,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpsysinfo-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpsysinfo-2.4.1"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory_222005.81.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347">CVE-2005-3347</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348">CVE-2005-3348</uri>
+ <uri link="https://www.hardened-php.net/advisory_222005.81.html">Original advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347">CVE-2005-3347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348">CVE-2005-3348</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Nov 2005 11:13:22 +0000">
+ <metadata tag="requester" timestamp="2005-11-21T11:13:22Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Nov 2005 13:32:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-21T13:32:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 18:14:24 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T18:14:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200511-19.xml b/glsa-200511-19.xml
index 7a5e26db..6354dd45 100644
--- a/glsa-200511-19.xml
+++ b/glsa-200511-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-19">
<title>eix: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">eix</product>
- <announced>November 22, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>112061</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose app-portage/eix</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3785">CVE-2005-3785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3785">CVE-2005-3785</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Nov 2005 09:11:10 +0000">
+ <metadata tag="requester" timestamp="2005-11-21T09:11:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 20:48:28 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T20:48:28Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 22 Nov 2005 08:46:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-22T08:46:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-20.xml b/glsa-200511-20.xml
index 779863bc..baebb983 100644
--- a/glsa-200511-20.xml
+++ b/glsa-200511-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-20">
<title>Horde Application Framework: XSS vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
content.
</synopsis>
<product type="ebuild">horde</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112491</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-2.2.9"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570">CVE-2005-3570</uri>
- <uri link="http://lists.horde.org/archives/announce/2005/000231.html">Horde Announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570">CVE-2005-3570</uri>
+ <uri link="https://lists.horde.org/archives/announce/2005/000231.html">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2005 18:32:42 +0000">
+ <metadata tag="requester" timestamp="2005-11-20T18:32:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2005 19:23:12 +0000">
+ <metadata tag="submitter" timestamp="2005-11-20T19:23:12Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Nov 2005 09:22:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-21T09:22:48Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-21.xml b/glsa-200511-21.xml
index 762ca048..9e52ac8d 100644
--- a/glsa-200511-21.xml
+++ b/glsa-200511-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-21">
<title>Macromedia Flash Player: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
a user's system via the handling of malicious SWF files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>November 25, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-11-25</announced>
+ <revised>2009-05-28: 02</revised>
<bug>112251</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.61&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.61"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2628">CVE-2005-2628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2628">CVE-2005-2628</uri>
<uri link="http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html">Macromedia Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Nov 2005 12:28:16 +0000">
+ <metadata tag="requester" timestamp="2005-11-18T12:28:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Nov 2005 22:27:02 +0000">
+ <metadata tag="submitter" timestamp="2005-11-18T22:27:02Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Nov 2005 08:20:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-25T08:20:52Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200511-22.xml b/glsa-200511-22.xml
index 2ba0a5f9..15413622 100644
--- a/glsa-200511-22.xml
+++ b/glsa-200511-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-22">
<title>Inkscape: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
when opened.
</synopsis>
<product type="ebuild">Inkscape</product>
- <announced>November 28, 2005</announced>
- <revised>November 28, 2005: 01</revised>
+ <announced>2005-11-28</announced>
+ <revised>2005-11-28: 01</revised>
<bug>109993</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/inkscape-0.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/inkscape-0.43"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3737">CVE-2005-3737</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3737">CVE-2005-3737</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2005 12:36:14 +0000">
+ <metadata tag="requester" timestamp="2005-11-23T12:36:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Nov 2005 22:39:24 +0000">
+ <metadata tag="submitter" timestamp="2005-11-23T22:39:24Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Nov 2005 21:35:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-27T21:35:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200511-23.xml b/glsa-200511-23.xml
index 24e69b19..367b52f4 100644
--- a/glsa-200511-23.xml
+++ b/glsa-200511-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-23">
<title>chmlib, KchmViewer: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">chmlib kchmviewer</product>
- <announced>November 28, 2005</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2005-11-28</announced>
+ <revised>2009-05-28: 03</revised>
<bug>110557</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/chmlib-0.37.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/chmlib-0.37.4"</code>
<p>
All KchmViewer users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/kchmviewer-1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/kchmviewer-1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318">CVE-2005-3318</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318">CVE-2005-3318</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2005 10:03:15 +0000">
+ <metadata tag="requester" timestamp="2005-11-25T10:03:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Nov 2005 02:10:11 +0000">
+ <metadata tag="submitter" timestamp="2005-11-26T02:10:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Nov 2005 20:16:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-27T20:16:26Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200512-01.xml b/glsa-200512-01.xml
index 5ff3cfcf..e595beca 100644
--- a/glsa-200512-01.xml
+++ b/glsa-200512-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-01">
<title>Perl: Format string errors can lead to code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>December 07, 2005</announced>
- <revised>December 07, 2005: 01</revised>
+ <announced>2005-12-07</announced>
+ <revised>2005-12-07: 01</revised>
<bug>114113</bug>
<access>remote and local</access>
<affected>
@@ -68,17 +67,17 @@
# emerge --ask --oneshot --verbose dev-lang/perl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962">CVE-2005-3962</uri>
- <uri link="http://www.dyadsecurity.com/perl-0002.html">Dyad Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962">CVE-2005-3962</uri>
+ <uri link="https://www.dyadsecurity.com/perl-0002.html">Dyad Security Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/418460/30/30">Research on format string errors in Perl</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Dec 2005 12:36:20 +0000">
+ <metadata tag="requester" timestamp="2005-12-01T12:36:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Dec 2005 16:05:52 +0000">
+ <metadata tag="submitter" timestamp="2005-12-01T16:05:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Dec 2005 10:06:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-07T10:06:40Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-02.xml b/glsa-200512-02.xml
index 0da8a3d0..feb883b0 100644
--- a/glsa-200512-02.xml
+++ b/glsa-200512-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-02">
<title>Webmin, Usermin: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">webmin usermin</product>
- <announced>December 07, 2005</announced>
- <revised>December 07, 2005: 01</revised>
+ <announced>2005-12-07</announced>
+ <revised>2005-12-07: 01</revised>
<bug>113888</bug>
<access>remote</access>
<affected>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.250&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.250"</code>
<p>
All Usermin users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/usermin-1.180&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/usermin-1.180"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912">CVE-2005-3912</uri>
- <uri link="http://www.dyadsecurity.com/webmin-0001.html">Dyad Security Advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912">CVE-2005-3912</uri>
+ <uri link="https://www.dyadsecurity.com/webmin-0001.html">Dyad Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Dec 2005 16:39:12 +0000">
+ <metadata tag="requester" timestamp="2005-12-01T16:39:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Dec 2005 19:02:00 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-04T19:02:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2005 03:16:21 +0000">
+ <metadata tag="submitter" timestamp="2005-12-05T03:16:21Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200512-03.xml b/glsa-200512-03.xml
index 6d5388c3..cf22b93f 100644
--- a/glsa-200512-03.xml
+++ b/glsa-200512-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-03">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote file inclusion vulnerabilities.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>December 11, 2005</announced>
- <revised>December 11, 2005: 01</revised>
+ <announced>2005-12-11</announced>
+ <revised>2005-12-11: 01</revised>
<bug>114662</bug>
<access>remote</access>
<affected>
@@ -57,22 +56,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.7.0_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.7.0_p1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3665">CVE-2005-3665</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4079">CVE-2005-4079</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-8">PMASA-2005-8</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-9">PMASA-2005-9</uri>
- <uri link="http://www.hardened-php.net/advisory_252005.110.html">Hardened-PHP Advisory 25/2005</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3665">CVE-2005-3665</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4079">CVE-2005-4079</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-8">PMASA-2005-8</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-9">PMASA-2005-9</uri>
+ <uri link="https://www.hardened-php.net/advisory_252005.110.html">Hardened-PHP Advisory 25/2005</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Dec 2005 12:42:53 +0000">
+ <metadata tag="requester" timestamp="2005-12-07T12:42:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2005 11:27:37 +0000">
+ <metadata tag="submitter" timestamp="2005-12-08T11:27:37Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Dec 2005 17:53:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-11T17:53:22Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-04.xml b/glsa-200512-04.xml
index e13e4a17..0d7b0a46 100644
--- a/glsa-200512-04.xml
+++ b/glsa-200512-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-04">
<title>Openswan, IPsec-Tools: Vulnerabilities in ISAKMP Protocol implementation</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service attack.
</synopsis>
<product type="ebuild">openswan ipsec-tools</product>
- <announced>December 12, 2005</announced>
- <revised>December 14, 2005: 02</revised>
+ <announced>2005-12-12</announced>
+ <revised>2005-12-14: 02</revised>
<bug>112568</bug>
<bug>113201</bug>
<access>remote</access>
@@ -62,7 +61,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.4"</code>
<p>
All IPsec-Tools users should upgrade to the latest version:
</p>
@@ -71,17 +70,17 @@
# emerge --ask --oneshot --verbose net-firewall/ipsec-tools</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671">CVE-2005-3671</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732">CVE-2005-3732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671">CVE-2005-3671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732">CVE-2005-3732</uri>
<uri link="http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Dec 2005 12:39:46 +0000">
+ <metadata tag="requester" timestamp="2005-12-02T12:39:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Dec 2005 03:24:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-05T03:24:10Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2005 03:54:41 +0000">
+ <metadata tag="submitter" timestamp="2005-12-05T03:54:41Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200512-05.xml b/glsa-200512-05.xml
index 36c17e95..9c033f78 100644
--- a/glsa-200512-05.xml
+++ b/glsa-200512-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-05">
<title>Xmail: Privilege escalation through sendmail</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in local privilege escalation.
</synopsis>
<product type="ebuild">xmail</product>
- <announced>December 14, 2005</announced>
- <revised>December 14, 2005: 01</revised>
+ <announced>2005-12-14</announced>
+ <revised>2005-12-14: 01</revised>
<bug>109381</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/xmail-1.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/xmail-1.22"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2943">CVE-2005-2943</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2943">CVE-2005-2943</uri>
<uri link="http://www.idefense.com/application/poi/display?id=321&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Dec 2005 18:01:24 +0000">
+ <metadata tag="requester" timestamp="2005-12-11T18:01:24Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Dec 2005 15:24:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-12T15:24:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2005 08:46:36 +0000">
+ <metadata tag="submitter" timestamp="2005-12-13T08:46:36Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200512-06.xml b/glsa-200512-06.xml
index 79a82a84..bcc94721 100644
--- a/glsa-200512-06.xml
+++ b/glsa-200512-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-06">
<title>Ethereal: Buffer overflow in OSPF protocol dissector</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>December 14, 2005</announced>
- <revised>December 14, 2005: 01</revised>
+ <announced>2005-12-14</announced>
+ <revised>2005-12-14: 01</revised>
<bug>115030</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.13-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.13-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651">CVE-2005-3651</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651">CVE-2005-3651</uri>
<uri link="http://www.idefense.com/application/poi/display?id=349&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 12 Dec 2005 15:18:48 +0000">
+ <metadata tag="submitter" timestamp="2005-12-12T15:18:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Dec 2005 12:23:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-14T12:23:23Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-07.xml b/glsa-200512-07.xml
index 52d8604c..e0374281 100644
--- a/glsa-200512-07.xml
+++ b/glsa-200512-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-07">
<title>OpenLDAP, Gauche: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">OpenLDAP Gauche</product>
- <announced>December 15, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-12-15</announced>
+ <revised>2007-12-30: 03</revised>
<bug>105380</bug>
<bug>112577</bug>
<access>local</access>
@@ -62,16 +61,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-scheme/gauche-0.8.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-scheme/gauche-0.8.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4442">CVE-2005-4442</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4443">CVE-2005-4443</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4442">CVE-2005-4442</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4443">CVE-2005-4443</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 13:30:23 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T13:30:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Dec 2005 13:31:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-14T13:31:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-08.xml b/glsa-200512-08.xml
index 7bb32e7d..8ffe8e96 100644
--- a/glsa-200512-08.xml
+++ b/glsa-200512-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-08">
<title>Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Poppler potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xpdf, gpdf, poppler,cups</product>
- <announced>December 16, 2005</announced>
- <revised>December 17, 2005: 02</revised>
+ <announced>2005-12-16</announced>
+ <revised>2005-12-17: 02</revised>
<bug>114428</bug>
<bug>115286</bug>
<access>remote</access>
@@ -65,13 +64,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r2"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r2"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
@@ -83,20 +82,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191">CVE-2005-3191</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192">CVE-2005-3192</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193">CVE-2005-3193</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191">CVE-2005-3191</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192">CVE-2005-3192</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193">CVE-2005-3193</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Dec 2005 08:57:56 +0000">
+ <metadata tag="requester" timestamp="2005-12-08T08:57:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 12:15:58 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T12:15:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 11:55:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T11:55:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-09.xml b/glsa-200512-09.xml
index 72d3f938..e277cec8 100644
--- a/glsa-200512-09.xml
+++ b/glsa-200512-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-09">
<title>cURL: Off-by-one errors in URL handling</title>
<synopsis>
@@ -8,8 +7,8 @@
due to the insecure parsing of URLs.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>December 16, 2005</announced>
- <revised>December 16, 2005: 01</revised>
+ <announced>2005-12-16</announced>
+ <revised>2005-12-16: 01</revised>
<bug>114710</bug>
<access>local</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
- <uri link="http://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
+ <uri link="https://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Dec 2005 13:39:33 +0000">
+ <metadata tag="requester" timestamp="2005-12-14T13:39:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 17:20:45 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T17:20:45Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 11:37:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T11:37:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-10.xml b/glsa-200512-10.xml
index 84252337..22eba892 100644
--- a/glsa-200512-10.xml
+++ b/glsa-200512-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-10">
<title>Opera: Command-line URL shell command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary commands.
</synopsis>
<product type="ebuild">opera</product>
- <announced>December 18, 2005</announced>
- <revised>December 18, 2005: 01</revised>
+ <announced>2005-12-18</announced>
+ <revised>2005-12-18: 01</revised>
<bug>113239</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-8.51&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-8.51"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3750">CVE-2005-3750</uri>
- <uri link="http://www.opera.com/docs/changelogs/linux/851/">Opera 8.51 Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3750">CVE-2005-3750</uri>
+ <uri link="https://www.opera.com/docs/changelogs/linux/851/">Opera 8.51 Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Dec 2005 12:24:01 +0000">
+ <metadata tag="requester" timestamp="2005-12-15T12:24:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 12:24:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T12:24:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Dec 2005 02:18:07 +0000">
+ <metadata tag="submitter" timestamp="2005-12-16T02:18:07Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200512-11.xml b/glsa-200512-11.xml
index 238fee36..3355ac85 100644
--- a/glsa-200512-11.xml
+++ b/glsa-200512-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-11">
<title>CenterICQ: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
library.
</synopsis>
<product type="ebuild">CenterICQ</product>
- <announced>December 20, 2005</announced>
- <revised>December 20, 2005: 01</revised>
+ <announced>2005-12-20</announced>
+ <revised>2005-12-20: 01</revised>
<bug>100519</bug>
<bug>114038</bug>
<access>remote</access>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/centericq-4.21.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/centericq-4.21.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3694">CVE-2005-3694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3694">CVE-2005-3694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
<uri link="http://www.zone-h.org/en/advisories/read/id=8480/">Zone-H Research ZRCSA 200503</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 16 Dec 2005 12:39:29 +0000">
+ <metadata tag="requester" timestamp="2005-12-16T12:39:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Dec 2005 10:48:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-17T10:48:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Dec 2005 11:38:58 +0000">
+ <metadata tag="submitter" timestamp="2005-12-18T11:38:58Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-12.xml b/glsa-200512-12.xml
index dc2da3e9..e5ec6207 100644
--- a/glsa-200512-12.xml
+++ b/glsa-200512-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-12">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL injection to cross-site scripting and HTTP response splitting.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>December 22, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>116036</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.4"</code>
</resolution>
<references>
- <uri link="http://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4518">CVE-2005-4518</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4519">CVE-2005-4519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4520">CVE-2005-4520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4521">CVE-2005-4521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4522">CVE-2005-4522</uri>
+ <uri link="https://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4518">CVE-2005-4518</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4519">CVE-2005-4519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4520">CVE-2005-4520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4521">CVE-2005-4521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4522">CVE-2005-4522</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 Dec 2005 11:13:27 +0000">
+ <metadata tag="submitter" timestamp="2005-12-20T11:13:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Dec 2005 11:13:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-20T11:13:46Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200512-13.xml b/glsa-200512-13.xml
index efe43b69..6b9bf55b 100644
--- a/glsa-200512-13.xml
+++ b/glsa-200512-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-13">
<title>Dropbear: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code as the root user.
</synopsis>
<product type="ebuild">dropbear</product>
- <announced>December 23, 2005</announced>
- <revised>December 23, 2005: 01</revised>
+ <announced>2005-12-23</announced>
+ <revised>2005-12-23: 01</revised>
<bug>116006</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dropbear-0.47&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dropbear-0.47"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4178">CVE-2005-4178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4178">CVE-2005-4178</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Dec 2005 11:10:03 +0000">
+ <metadata tag="requester" timestamp="2005-12-20T11:10:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Dec 2005 16:40:12 +0000">
+ <metadata tag="submitter" timestamp="2005-12-20T16:40:12Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Dec 2005 10:00:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-21T10:00:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200512-14.xml b/glsa-200512-14.xml
index 35320893..7d6c0af7 100644
--- a/glsa-200512-14.xml
+++ b/glsa-200512-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-14">
<title>NBD Tools: Buffer overflow in NBD server</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">NBD</product>
- <announced>December 23, 2005</announced>
- <revised>December 23, 2005: 01</revised>
+ <announced>2005-12-23</announced>
+ <revised>2005-12-23: 01</revised>
<bug>116314</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-block/nbd-2.8.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-block/nbd-2.8.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534">CVE-2005-3534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534">CVE-2005-3534</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Dec 2005 10:21:27 +0000">
+ <metadata tag="submitter" timestamp="2005-12-23T10:21:27Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Dec 2005 10:21:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-23T10:21:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-15.xml b/glsa-200512-15.xml
index 4613e4d3..6500cdd2 100644
--- a/glsa-200512-15.xml
+++ b/glsa-200512-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-15">
<title>rssh: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
directories.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>December 27, 2005</announced>
- <revised>December 27, 2005: 01</revised>
+ <announced>2005-12-27</announced>
+ <revised>2005-12-27: 01</revised>
<bug>115082</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh-2.3.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3345">CVE-2005-3345</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3345">CVE-2005-3345</uri>
<uri link="http://www.pizzashack.org/rssh/security.shtml">rssh security announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Dec 2005 10:25:35 +0000">
+ <metadata tag="requester" timestamp="2005-12-23T10:25:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 25 Dec 2005 13:06:13 +0000">
+ <metadata tag="submitter" timestamp="2005-12-25T13:06:13Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Dec 2005 13:28:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-26T13:28:20Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200512-16.xml b/glsa-200512-16.xml
index c5ee3550..ed6871ab 100644
--- a/glsa-200512-16.xml
+++ b/glsa-200512-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-16">
<title>OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library</title>
<synopsis>
@@ -8,8 +7,8 @@
toolkit, that can potentially lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>December 28, 2005</announced>
- <revised>January 29, 2006: 03</revised>
+ <announced>2005-12-28</announced>
+ <revised>2006-01-29: 03</revised>
<bug>114234</bug>
<bug>116481</bug>
<access>remote</access>
@@ -67,13 +66,13 @@
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964">CVE-2005-3964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964">CVE-2005-3964</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0047.html">xfocus SD-051202 Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2005 10:06:00 +0000">
+ <metadata tag="submitter" timestamp="2005-12-27T10:06:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Dec 2005 10:07:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-27T10:07:13Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-17.xml b/glsa-200512-17.xml
index fa0d13a4..13e53784 100644
--- a/glsa-200512-17.xml
+++ b/glsa-200512-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-17">
<title>scponly: Multiple privilege escalation issues</title>
<synopsis>
@@ -9,8 +8,8 @@
restrictions.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>December 29, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>116526</bug>
<access>local and remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.2"</code>
</resolution>
<references>
<uri link="http://sublimation.org/scponly/index.html#relnotes">scponly release notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4532">CVE-2005-4532</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4533">CVE-2005-4533</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4532">CVE-2005-4532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4533">CVE-2005-4533</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2005 09:38:39 +0000">
+ <metadata tag="submitter" timestamp="2005-12-27T09:38:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Dec 2005 10:10:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-29T10:10:38Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200512-18.xml b/glsa-200512-18.xml
index 808df825..54143002 100644
--- a/glsa-200512-18.xml
+++ b/glsa-200512-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-18">
<title>XnView: Privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges of another user.
</synopsis>
<product type="ebuild">xnview</product>
- <announced>December 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>117063</bug>
<access>local</access>
<affected>
@@ -57,15 +56,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xnview-1.70-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xnview-1.70-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4595">CVE-2005-4595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4595">CVE-2005-4595</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 29 Dec 2005 17:05:23 +0000">
+ <metadata tag="submitter" timestamp="2005-12-29T17:05:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 30 Dec 2005 12:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-30T12:33:06Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200601-01.xml b/glsa-200601-01.xml
index 31f3e169..63c4d3af 100644
--- a/glsa-200601-01.xml
+++ b/glsa-200601-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-01">
<title>pinentry: Local privilege escalation</title>
<synopsis>
pinentry is vulnerable to privilege escalation.
</synopsis>
<product type="ebuild">pinentry</product>
- <announced>January 03, 2006</announced>
- <revised>January 03, 2006: 01</revised>
+ <announced>2006-01-03</announced>
+ <revised>2006-01-03: 01</revised>
<bug>116822</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/pinentry-0.7.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/pinentry-0.7.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0071">CVE-2006-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0071">CVE-2006-0071</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Dec 2005 13:13:15 +0000">
+ <metadata tag="requester" timestamp="2005-12-31T13:13:15Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 31 Dec 2005 13:13:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-31T13:13:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2006 22:02:30 +0000">
+ <metadata tag="submitter" timestamp="2006-01-02T22:02:30Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200601-02.xml b/glsa-200601-02.xml
index 79ec4e78..ec7d8df6 100644
--- a/glsa-200601-02.xml
+++ b/glsa-200601-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-02">
<title>KPdf, KWord: Multiple overflows in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kdegraphics, kpdf, koffice, kword</product>
- <announced>January 04, 2006</announced>
- <revised>January 07, 2006: 03</revised>
+ <announced>2006-01-04</announced>
+ <revised>2006-01-07: 03</revised>
<bug>114429</bug>
<bug>115851</bug>
<access>remote</access>
@@ -64,43 +63,43 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.4.3-r3"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.3-r3"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.4.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.4.2-r6"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.4.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.4.2-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191">CAN-2005-3191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192">CAN-2005-3192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CAN-2005-3193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628">CVE-2005-3628</uri>
- <uri link="/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
- <uri link="http://www.kde.org/info/security/advisory-20051207-2.txt">KDE Security Advisory: kpdf/xpdf multiple integer overflows</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191">CAN-2005-3191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192">CAN-2005-3192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CAN-2005-3193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628">CVE-2005-3628</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20051207-2.txt">KDE Security Advisory: kpdf/xpdf multiple integer overflows</uri>
<uri link="http://scary.beasts.org/security/CESA-2005-003.txt">CESA-2005-003</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2005 08:56:38 +0000">
+ <metadata tag="submitter" timestamp="2005-12-08T08:56:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 04 Jan 2006 21:03:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-04T21:03:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200601-03.xml b/glsa-200601-03.xml
index e5907b89..e10e7202 100644
--- a/glsa-200601-03.xml
+++ b/glsa-200601-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-03">
<title>HylaFAX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">hylafax</product>
- <announced>January 06, 2006</announced>
- <revised>January 06, 2006: 01</revised>
+ <announced>2006-01-06</announced>
+ <revised>2006-01-06: 01</revised>
<bug>116389</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hylafax-4.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hylafax-4.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3538">CVE-2005-3538</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3539">CVE-2005-3539</uri>
- <uri link="http://www.hylafax.org/content/HylaFAX_4.2.4_release">HylaFAX release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3538">CVE-2005-3538</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3539">CVE-2005-3539</uri>
+ <uri link="https://www.hylafax.org/content/HylaFAX_4.2.4_release">HylaFAX release announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2006 21:40:30 +0000">
+ <metadata tag="submitter" timestamp="2006-01-02T21:40:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Jan 2006 13:37:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-06T13:37:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200601-04.xml b/glsa-200601-04.xml
index 17792d3c..2b1c0855 100644
--- a/glsa-200601-04.xml
+++ b/glsa-200601-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-04">
<title>VMware Workstation: Vulnerability in NAT networking</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges on the host operating system through a flaw in NAT networking.
</synopsis>
<product type="ebuild">VMware</product>
- <announced>January 07, 2006</announced>
- <revised>May 25, 2006: 02</revised>
+ <announced>2006-01-07</announced>
+ <revised>2006-05-25: 02</revised>
<bug>116238</bug>
<access>remote and local</access>
<affected>
@@ -42,8 +41,7 @@
</impact>
<workaround>
<p>
- Disable the NAT service by following the instructions at <uri
- link="http://www.vmware.com/support/kb">http://www.vmware.com/support/k
+ Disable the NAT service by following the instructions at <uri link="http://www.vmware.com/support/kb">http://www.vmware.com/support/k
b</uri>, Answer ID 2002.
</p>
</workaround>
@@ -56,13 +54,13 @@
# emerge --ask --oneshot --verbose app-emulation/vmware-workstation</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4459">CVE-2005-4459</uri>
- <uri link="http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000">VMware Security Response</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4459">CVE-2005-4459</uri>
+ <uri link="https://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000">VMware Security Response</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 04 Jan 2006 10:03:43 +0000">
+ <metadata tag="submitter" timestamp="2006-01-04T10:03:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 05 Jan 2006 15:09:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-05T15:09:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200601-05.xml b/glsa-200601-05.xml
index 17a80189..7484ecea 100644
--- a/glsa-200601-05.xml
+++ b/glsa-200601-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-05">
<title>mod_auth_pgsql: Multiple format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">mod_auth_pgsql</product>
- <announced>January 10, 2006</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2006-01-10</announced>
+ <revised>2007-12-30: 03</revised>
<bug>118096</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_auth_pgsql-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_auth_pgsql-2.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656">CVE-2005-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656">CVE-2005-3656</uri>
<uri link="http://www.frsirt.com/english/advisories/2006/0070">FrSIRT ADV-2006-0070</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2006 17:42:51 +0000">
+ <metadata tag="requester" timestamp="2006-01-08T17:42:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Jan 2006 17:43:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-08T17:43:17Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Jan 2006 09:56:56 +0000">
+ <metadata tag="submitter" timestamp="2006-01-09T09:56:56Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-06.xml b/glsa-200601-06.xml
index 2cc1ea14..f779a5d7 100644
--- a/glsa-200601-06.xml
+++ b/glsa-200601-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-06">
<title>xine-lib, FFmpeg: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib ffmpeg</product>
- <announced>January 10, 2006</announced>
- <revised>January 10, 2006: 01</revised>
+ <announced>2006-01-10</announced>
+ <revised>2006-01-10: 01</revised>
<bug>115849</bug>
<bug>116181</bug>
<access>remote</access>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.1-r3"</code>
<p>
All FFmpeg users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20051216&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20051216"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558">Original advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jan 2006 10:30:55 +0000">
+ <metadata tag="requester" timestamp="2006-01-03T10:30:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jan 2006 00:22:43 +0000">
+ <metadata tag="submitter" timestamp="2006-01-06T00:22:43Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Jan 2006 22:59:16 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-09T22:59:16Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-07.xml b/glsa-200601-07.xml
index 67c79270..7f371087 100644
--- a/glsa-200601-07.xml
+++ b/glsa-200601-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-07">
<title>ClamAV: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>January 13, 2006</announced>
- <revised>January 13, 2006: 01</revised>
+ <announced>2006-01-13</announced>
+ <revised>2006-01-13: 01</revised>
<bug>118459</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162">CVE-2006-0162</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162">CVE-2006-0162</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2006 23:12:07 +0000">
+ <metadata tag="requester" timestamp="2006-01-09T23:12:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2006 01:55:27 +0000">
+ <metadata tag="submitter" timestamp="2006-01-11T01:55:27Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Jan 2006 21:27:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-12T21:27:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-08.xml b/glsa-200601-08.xml
index c533c069..4ffb6b91 100644
--- a/glsa-200601-08.xml
+++ b/glsa-200601-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-08">
<title>Blender: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>January 13, 2006</announced>
- <revised>January 13, 2006: 01</revised>
+ <announced>2006-01-13</announced>
+ <revised>2006-01-13: 01</revised>
<bug>118163</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.40"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4470">CVE-2005-4470</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4470">CVE-2005-4470</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2006 19:17:22 +0000">
+ <metadata tag="requester" timestamp="2006-01-10T19:17:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 Jan 2006 19:17:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-10T19:17:39Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2006 01:12:10 +0000">
+ <metadata tag="submitter" timestamp="2006-01-11T01:12:10Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200601-09.xml b/glsa-200601-09.xml
index be6b5c02..3ae02dc0 100644
--- a/glsa-200601-09.xml
+++ b/glsa-200601-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-09">
<title>Wine: Windows Metafile SETABORTPROC vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
which could possibly result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">wine</product>
- <announced>January 13, 2006</announced>
- <revised>February 26, 2007: 03</revised>
+ <announced>2006-01-13</announced>
+ <revised>2007-02-26: 03</revised>
<bug>118101</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/wine-0.9.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/wine-0.9.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0106">CVE-2006-0106</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0106">CVE-2006-0106</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2006 16:28:07 +0000">
+ <metadata tag="requester" timestamp="2006-01-08T16:28:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Jan 2006 17:43:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-08T17:43:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2006 08:25:50 +0000">
+ <metadata tag="submitter" timestamp="2006-01-12T08:25:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-10.xml b/glsa-200601-10.xml
index b581baff..68a4d4eb 100644
--- a/glsa-200601-10.xml
+++ b/glsa-200601-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-10">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
their privileges.
</synopsis>
<product type="ebuild">sun-jdk sun-jre-bin blackdown-jre blackdown-jdk</product>
- <announced>January 16, 2006</announced>
- <revised>January 16, 2006: 01</revised>
+ <announced>2006-01-16</announced>
+ <revised>2006-01-16: 01</revised>
<bug>118114</bug>
<access>remote</access>
<affected>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.09"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.09"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.03&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.03"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.03&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.03"</code>
<p>
Note to SPARC and PPC users: There is no stable secure
Blackdown Java for the SPARC or PPC architectures. Affected users on
@@ -90,15 +89,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905">CVE-2005-3905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906">CVE-2005-3906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905">CVE-2005-3905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906">CVE-2005-3906</uri>
<uri link="http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1">Sun Security Alert ID 102003</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-03.txt">Blackdown Java-Linux Security Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 13 Jan 2006 09:49:14 +0000">
+ <metadata tag="submitter" timestamp="2006-01-13T09:49:14Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Jan 2006 09:55:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-13T09:55:18Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200601-11.xml b/glsa-200601-11.xml
index 4ec44092..afb9e6b5 100644
--- a/glsa-200601-11.xml
+++ b/glsa-200601-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-11">
<title>KDE kjs: URI heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>January 22, 2006</announced>
- <revised>January 22, 2006: 01</revised>
+ <announced>2006-01-22</announced>
+ <revised>2006-01-22: 01</revised>
<bug>118550</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs-3.4.3-r1</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019">CVE-2006-0019</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060119-1.txt">KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019">CVE-2006-0019</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060119-1.txt">KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 20 Jan 2006 06:30:56 +0000">
+ <metadata tag="submitter" timestamp="2006-01-20T06:30:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Jan 2006 13:57:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-21T13:57:57Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-12.xml b/glsa-200601-12.xml
index 68319bdf..f4da02e8 100644
--- a/glsa-200601-12.xml
+++ b/glsa-200601-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-12">
<title>Trac: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">trac</product>
- <announced>January 26, 2006</announced>
- <revised>January 26, 2006: 01</revised>
+ <announced>2006-01-26</announced>
+ <revised>2006-01-26: 01</revised>
<bug>118302</bug>
<access>remote</access>
<affected>
@@ -48,23 +47,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.9.3"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4305">CVE-2005-4305</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4305">CVE-2005-4305</uri>
<uri link="http://projects.edgewall.com/trac/wiki/ChangeLog#a0.9.3">Trac Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jan 2006 15:05:49 +0000">
+ <metadata tag="requester" timestamp="2006-01-18T15:05:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Jan 2006 15:05:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-18T15:05:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jan 2006 19:44:58 +0000">
+ <metadata tag="submitter" timestamp="2006-01-22T19:44:58Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-13.xml b/glsa-200601-13.xml
index 3b34bd6c..d394557a 100644
--- a/glsa-200601-13.xml
+++ b/glsa-200601-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-13">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allow arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>January 26, 2006</announced>
- <revised>January 26, 2006: 01</revised>
+ <announced>2006-01-26</announced>
+ <revised>2006-01-26: 01</revised>
<bug>119590</bug>
<access>remote</access>
<affected>
@@ -51,7 +50,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.5.2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -59,15 +58,15 @@
</resolution>
<references>
<uri link="http://gallery.menalto.com/page/gallery_1_5_2_release">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0330">CVE-2006-0330</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0330">CVE-2006-0330</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jan 2006 19:16:38 +0000">
+ <metadata tag="requester" timestamp="2006-01-22T19:16:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Jan 2006 19:17:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-22T19:17:06Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jan 2006 19:28:37 +0000">
+ <metadata tag="submitter" timestamp="2006-01-22T19:28:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200601-14.xml b/glsa-200601-14.xml
index bf262341..25e33fdb 100644
--- a/glsa-200601-14.xml
+++ b/glsa-200601-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-14">
<title>LibAST: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">LibAST</product>
- <announced>January 29, 2006</announced>
- <revised>January 29, 2006: 02</revised>
+ <announced>2006-01-29</announced>
+ <revised>2006-01-29: 02</revised>
<bug>120106</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libast-0.7&quot;
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libast-0.7"
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0224">CVE-2006-0224</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0224">CVE-2006-0224</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Jan 2006 21:44:39 +0000">
+ <metadata tag="requester" timestamp="2006-01-25T21:44:39Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jan 2006 09:35:14 +0000">
+ <metadata tag="submitter" timestamp="2006-01-26T09:35:14Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:23:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:23:22Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200601-15.xml b/glsa-200601-15.xml
index b5c2a15b..8240f3e9 100644
--- a/glsa-200601-15.xml
+++ b/glsa-200601-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-15">
<title>Paros: Default administrator password</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary system commands.
</synopsis>
<product type="ebuild">Paros</product>
- <announced>January 29, 2006</announced>
- <revised>January 29, 2006: 01</revised>
+ <announced>2006-01-29</announced>
+ <revised>2006-01-29: 01</revised>
<bug>120352</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --snyc
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/paros-3.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/paros-3.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3280">CVE-2005-3280</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3280">CVE-2005-3280</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 Jan 2006 06:06:09 +0000">
+ <metadata tag="submitter" timestamp="2006-01-26T06:06:09Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:44:45 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:44:45Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200601-16.xml b/glsa-200601-16.xml
index 55ab9402..093625d0 100644
--- a/glsa-200601-16.xml
+++ b/glsa-200601-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-16">
<title>MyDNS: Denial of Service</title>
<synopsis>
MyDNS contains a vulnerability that may lead to a Denial of Service attack.
</synopsis>
<product type="ebuild">MyDNS</product>
- <announced>January 30, 2006</announced>
- <revised>January 30, 2006: 01</revised>
+ <announced>2006-01-30</announced>
+ <revised>2006-01-30: 01</revised>
<bug>119548</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/mydns-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/mydns-1.1.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0351">CVE-2006-0351</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0351">CVE-2006-0351</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Jan 2006 19:31:44 +0000">
+ <metadata tag="requester" timestamp="2006-01-25T19:31:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jan 2006 05:37:45 +0000">
+ <metadata tag="submitter" timestamp="2006-01-27T05:37:45Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:29:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:29:58Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200601-17.xml b/glsa-200601-17.xml
index 0f2c3140..0734dbb8 100644
--- a/glsa-200601-17.xml
+++ b/glsa-200601-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-17">
<title>Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows that may be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">xpdf poppler gpdf libextractor pdftohtml</product>
- <announced>January 30, 2006</announced>
- <revised>January 30, 2006: 01</revised>
+ <announced>2006-01-30</announced>
+ <revised>2006-01-30: 01</revised>
<bug>117481</bug>
<bug>117494</bug>
<bug>117495</bug>
@@ -73,43 +72,43 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r5"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.4.3-r4"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r3"</code>
<p>
All libextractor users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.9"</code>
<p>
All pdftohtml users should migrate to the latest stable version
of Poppler.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2006 22:04:57 +0000">
+ <metadata tag="requester" timestamp="2006-01-16T22:04:57Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jan 2006 03:14:48 +0000">
+ <metadata tag="submitter" timestamp="2006-01-17T03:14:48Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jan 2006 17:26:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-29T17:26:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200602-01.xml b/glsa-200602-01.xml
index 9cc96bc3..b20d6482 100644
--- a/glsa-200602-01.xml
+++ b/glsa-200602-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-01">
<title>GStreamer FFmpeg plugin: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">gst-plugins-ffmpeg</product>
- <announced>February 05, 2006</announced>
- <revised>February 05, 2006: 01</revised>
+ <announced>2006-02-05</announced>
+ <revised>2006-02-05: 01</revised>
<bug>119512</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-ffmpeg-0.8.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-ffmpeg-0.8.7-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jan 2006 21:54:38 +0000">
+ <metadata tag="requester" timestamp="2006-01-29T21:54:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Jan 2006 03:13:44 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-31T03:13:44Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Wed, 01 Feb 2006 15:27:50 +0000">
+ <metadata tag="submitter" timestamp="2006-02-01T15:27:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200602-02.xml b/glsa-200602-02.xml
index b0c676c2..175729f6 100644
--- a/glsa-200602-02.xml
+++ b/glsa-200602-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-02">
<title>ADOdb: PostgresSQL command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
PostgreSQL database.
</synopsis>
<product type="ebuild">ADOdb</product>
- <announced>February 06, 2006</announced>
- <revised>February 06, 2006: 01</revised>
+ <announced>2006-02-06</announced>
+ <revised>2006-02-06: 01</revised>
<bug>120215</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/adodb-4.71&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/adodb-4.71"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
</references>
- <metadata tag="bugReady" timestamp="Sat, 04 Feb 2006 17:34:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-04T17:34:56Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Feb 2006 08:23:05 +0000">
+ <metadata tag="submitter" timestamp="2006-02-06T08:23:05Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200602-03.xml b/glsa-200602-03.xml
index 26d6ee24..b7139a9e 100644
--- a/glsa-200602-03.xml
+++ b/glsa-200602-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-03">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to a Denial of Service attack.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>February 06, 2006</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2006-02-06</announced>
+ <revised>2007-12-30: 03</revised>
<bug>115324</bug>
<bug>118875</bug>
<access>remote</access>
@@ -63,37 +62,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.55-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.55-r1"</code>
<p>
2.0.x users, old style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-2.0.54-r16&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-2.0.54-r16"</code>
<p>
1.x users, new style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-1.3.34-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r11"</code>
<p>
1.x users, old style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-1.3.34-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Jan 2006 08:56:54 +0000">
+ <metadata tag="requester" timestamp="2006-01-23T08:56:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jan 2006 06:31:39 +0000">
+ <metadata tag="submitter" timestamp="2006-01-27T06:31:39Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Feb 2006 06:26:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-06T06:26:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200602-04.xml b/glsa-200602-04.xml
index d950f9fb..e0b99be3 100644
--- a/glsa-200602-04.xml
+++ b/glsa-200602-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-04">
<title>Xpdf, Poppler: Heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">xpdf poppler</product>
- <announced>February 12, 2006</announced>
- <revised>February 12, 2006: 01</revised>
+ <announced>2006-02-12</announced>
+ <revised>2006-02-12: 01</revised>
<bug>120985</bug>
<access>remote</access>
<affected>
@@ -53,23 +52,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r7"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.5.0-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.5.0-r4"</code>
<p>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Feb 2006 03:05:29 +0000">
+ <metadata tag="submitter" timestamp="2006-02-08T03:05:29Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Feb 2006 03:06:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-08T03:06:48Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200602-05.xml b/glsa-200602-05.xml
index ed8fc501..cee3c414 100644
--- a/glsa-200602-05.xml
+++ b/glsa-200602-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-05">
<title>KPdf: Heap based overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kdegraphics, kpdf</product>
- <announced>February 12, 2006</announced>
- <revised>February 12, 2006: 01</revised>
+ <announced>2006-02-12</announced>
+ <revised>2006-02-12: 01</revised>
<bug>121375</bug>
<access>remote</access>
<affected>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.4.3-r4"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060202-1.txt">KDE Security Advisory: kpdf/xpdf heap based buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060202-1.txt">KDE Security Advisory: kpdf/xpdf heap based buffer overflow</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Feb 2006 17:37:49 +0000">
+ <metadata tag="submitter" timestamp="2006-02-10T17:37:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Feb 2006 21:32:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-11T21:32:42Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-06.xml b/glsa-200602-06.xml
index 41c5b8ed..db1a2920 100644
--- a/glsa-200602-06.xml
+++ b/glsa-200602-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-06">
<title>ImageMagick: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
and potentially execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>February 13, 2006</announced>
- <revised>February 13, 2006: 01</revised>
+ <announced>2006-02-13</announced>
+ <revised>2006-02-13: 01</revised>
<bug>83542</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
- <uri link="/security/en/glsa/glsa-200503-11.xml">GLSA 200503-11</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200503-11.xml">GLSA 200503-11</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Feb 2006 19:11:00 +0000">
+ <metadata tag="requester" timestamp="2006-02-01T19:11:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Feb 2006 08:22:50 +0000">
+ <metadata tag="submitter" timestamp="2006-02-02T08:22:50Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Feb 2006 18:59:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-09T18:59:37Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-07.xml b/glsa-200602-07.xml
index 84b77ebd..a9720b74 100644
--- a/glsa-200602-07.xml
+++ b/glsa-200602-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-07">
<title>Sun JDK/JRE: Applet privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">Sun JDK, applet</product>
- <announced>February 15, 2006</announced>
- <revised>February 15, 2006: 01</revised>
+ <announced>2006-02-15</announced>
+ <revised>2006-02-15: 01</revised>
<bug>122156</bug>
<access>remote</access>
<affected>
@@ -60,26 +59,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.10"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.10"</code>
</resolution>
<references>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102170-1">Sun Security Alert ID 102170</uri>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1">Sun Security Alert ID 102171</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0614">CVE-2006-0614</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0615">CVE-2006-0615</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0616">CVE-2006-0616</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0617">CVE-2006-0617</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0614">CVE-2006-0614</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0615">CVE-2006-0615</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0616">CVE-2006-0616</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0617">CVE-2006-0617</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 09 Feb 2006 20:48:45 +0000">
+ <metadata tag="submitter" timestamp="2006-02-09T20:48:45Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Feb 2006 13:04:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-12T13:04:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-08.xml b/glsa-200602-08.xml
index 85b9cabc..7b3c4d94 100644
--- a/glsa-200602-08.xml
+++ b/glsa-200602-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-08">
<title>libtasn1, GNU TLS: Security flaw in DER decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>February 16, 2006</announced>
- <revised>February 16, 2006: 01</revised>
+ <announced>2006-02-16</announced>
+ <revised>2006-02-16: 01</revised>
<bug>122307</bug>
<access>remote</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libtasn1-0.2.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libtasn1-0.2.18"</code>
<p>
All GNU TLS users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-1.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-1.2.10"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645">CVE-2006-0645</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645">CVE-2006-0645</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Feb 2006 20:11:10 +0000">
+ <metadata tag="requester" timestamp="2006-02-13T20:11:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Feb 2006 20:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-13T20:11:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Feb 2006 22:53:09 +0000">
+ <metadata tag="submitter" timestamp="2006-02-14T22:53:09Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200602-09.xml b/glsa-200602-09.xml
index 5b5e5a43..9b226cf5 100644
--- a/glsa-200602-09.xml
+++ b/glsa-200602-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-09">
<title>BomberClone: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">games-action/bomberclone</product>
- <announced>February 16, 2006</announced>
- <revised>February 16, 2006: 01</revised>
+ <announced>2006-02-16</announced>
+ <revised>2006-02-16: 01</revised>
<bug>121605</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-action/bomberclone-0.11.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-action/bomberclone-0.11.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460">CVE-2006-0460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460">CVE-2006-0460</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Feb 2006 17:56:10 +0000">
+ <metadata tag="requester" timestamp="2006-02-14T17:56:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Feb 2006 17:58:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-14T17:58:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Feb 2006 11:54:36 +0000">
+ <metadata tag="submitter" timestamp="2006-02-15T11:54:36Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200602-10.xml b/glsa-200602-10.xml
index a9494490..588867e4 100644
--- a/glsa-200602-10.xml
+++ b/glsa-200602-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-10">
<title>GnuPG: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
incorrectly believe a signature has been verified.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>February 18, 2006</announced>
- <revised>February 18, 2006: 01</revised>
+ <announced>2006-02-18</announced>
+ <revised>2006-02-18: 01</revised>
<bug>122721</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.2.1"</code>
</resolution>
<references>
<uri link="http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html">GnuPG Security Announcement</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455">CVE-2006-0455</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455">CVE-2006-0455</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Feb 2006 16:05:31 +0000">
+ <metadata tag="submitter" timestamp="2006-02-15T16:05:31Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Feb 2006 12:22:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-18T12:22:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-11.xml b/glsa-200602-11.xml
index cc92681b..2c768568 100644
--- a/glsa-200602-11.xml
+++ b/glsa-200602-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-11">
<title>OpenSSH, Dropbear: Insecure use of system() call</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges via scp.
</synopsis>
<product type="ebuild">OpenSSH</product>
- <announced>February 20, 2006</announced>
- <revised>February 20, 2006: 01</revised>
+ <announced>2006-02-20</announced>
+ <revised>2006-02-20: 01</revised>
<bug>119232</bug>
<access>local</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.2_p1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.2_p1-r1"</code>
<p>
All Dropbear users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dropbear-0.47-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dropbear-0.47-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225">CVE-2006-0225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225">CVE-2006-0225</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Feb 2006 20:22:40 +0000">
+ <metadata tag="requester" timestamp="2006-02-06T20:22:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Feb 2006 06:29:22 +0000">
+ <metadata tag="submitter" timestamp="2006-02-07T06:29:22Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Feb 2006 20:03:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-20T20:03:36Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-12.xml b/glsa-200602-12.xml
index caee5f43..1bc991bd 100644
--- a/glsa-200602-12.xml
+++ b/glsa-200602-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-12">
<title>GPdf: heap overflows in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">gpdf</product>
- <announced>February 21, 2006</announced>
- <revised>February 21, 2006: 01</revised>
+ <announced>2006-02-21</announced>
+ <revised>2006-02-21: 01</revised>
<bug>121511</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Feb 2006 20:47:35 +0000">
+ <metadata tag="requester" timestamp="2006-02-16T20:47:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Feb 2006 21:40:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-17T21:40:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Feb 2006 23:04:04 +0000">
+ <metadata tag="submitter" timestamp="2006-02-17T23:04:04Z">
dragonheart
</metadata>
</glsa>
diff --git a/glsa-200602-13.xml b/glsa-200602-13.xml
index 6a05487d..c5876b15 100644
--- a/glsa-200602-13.xml
+++ b/glsa-200602-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-13">
<title>GraphicsMagick: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
and potentially execute arbitrary code.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>February 26, 2006</announced>
- <revised>February 26, 2006: 01</revised>
+ <announced>2006-02-26</announced>
+ <revised>2006-02-26: 01</revised>
<bug>119476</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.7"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200602-06.xml">GLSA 200602-06</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200602-06.xml">GLSA 200602-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Feb 2006 18:24:37 +0000">
+ <metadata tag="requester" timestamp="2006-02-21T18:24:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Feb 2006 11:24:17 +0000">
+ <metadata tag="submitter" timestamp="2006-02-22T11:24:17Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Feb 2006 21:18:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-22T21:18:32Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200602-14.xml b/glsa-200602-14.xml
index 6bb30b05..e074a8ef 100644
--- a/glsa-200602-14.xml
+++ b/glsa-200602-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-14">
<title>noweb: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">noweb</product>
- <announced>February 26, 2006</announced>
- <revised>February 26, 2006: 01</revised>
+ <announced>2006-02-26</announced>
+ <revised>2006-02-26: 01</revised>
<bug>122705</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/noweb-2.9-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/noweb-2.9-r5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3342">CVE-2005-3342</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3342">CVE-2005-3342</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Feb 2006 20:08:48 +0000">
+ <metadata tag="requester" timestamp="2006-02-23T20:08:48Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Feb 2006 20:09:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-23T20:09:04Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Feb 2006 14:44:04 +0000">
+ <metadata tag="submitter" timestamp="2006-02-24T14:44:04Z">
formula7
</metadata>
</glsa>
diff --git a/glsa-200603-01.xml b/glsa-200603-01.xml
index 83b7d943..42d28bd5 100644
--- a/glsa-200603-01.xml
+++ b/glsa-200603-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-01">
<title>WordPress: SQL injection vulnerability</title>
<synopsis>
WordPress is vulnerable to an SQL injection vulnerability.
</synopsis>
<product type="ebuild">WordPress</product>
- <announced>March 04, 2006</announced>
- <revised>March 04, 2006: 01</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-03-04: 01</revised>
<bug>121661</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012">CVE-2006-1012</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012">CVE-2006-1012</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 26 Feb 2006 14:42:26 +0000">
+ <metadata tag="submitter" timestamp="2006-02-26T14:42:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Feb 2006 14:42:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-26T14:42:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-02.xml b/glsa-200603-02.xml
index ceec8b49..731ae8b8 100644
--- a/glsa-200603-02.xml
+++ b/glsa-200603-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-02">
<title>teTeX, pTeX, CSTeX: Multiple overflows in included XPdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>March 04, 2006</announced>
- <revised>March 04, 2006: 01</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-03-04: 01</revised>
<bug>115775</bug>
<access>remote</access>
<affected>
@@ -60,32 +59,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-2.0.2-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-2.0.2-r8"</code>
<p>
All CSTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/cstetex-2.0.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/cstetex-2.0.2-r2"</code>
<p>
All pTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.5-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CVE-2005-3193</uri>
- <uri link="/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CVE-2005-3193</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
<uri link="http://scary.beasts.org/security/CESA-2005-003.txt">CESA-2005-003</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Feb 2006 20:57:52 +0000">
+ <metadata tag="requester" timestamp="2006-02-16T20:57:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Feb 2006 12:11:23 +0000">
+ <metadata tag="submitter" timestamp="2006-02-17T12:11:23Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Mar 2006 16:30:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-04T16:30:04Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-03.xml b/glsa-200603-03.xml
index 5200b6ce..8bd6b3be 100644
--- a/glsa-200603-03.xml
+++ b/glsa-200603-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-03">
<title>MPlayer: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
could potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>March 04, 2006</announced>
- <revised>June 21, 2006: 02</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-06-21: 02</revised>
<bug>115760</bug>
<bug>122029</bug>
<access>remote</access>
@@ -55,17 +54,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20060217&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20060217"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579">CVE-2006-0579</uri>
- <uri link="/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579">CVE-2006-0579</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 04 Mar 2006 11:56:49 +0000">
+ <metadata tag="submitter" timestamp="2006-03-04T11:56:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Mar 2006 11:56:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-04T11:56:59Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-04.xml b/glsa-200603-04.xml
index e9fed246..264a26cf 100644
--- a/glsa-200603-04.xml
+++ b/glsa-200603-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-04">
<title>IMAP Proxy: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when connected to malicious IMAP servers.
</synopsis>
<product type="ebuild">up-imapproxy</product>
- <announced>March 06, 2006</announced>
- <revised>March 06, 2006: 01</revised>
+ <announced>2006-03-06</announced>
+ <revised>2006-03-06: 01</revised>
<bug>107679</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/up-imapproxy-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/up-imapproxy-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2661">CVE-2005-2661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2661">CVE-2005-2661</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Mar 2006 09:44:08 +0000">
+ <metadata tag="requester" timestamp="2006-03-05T09:44:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 05 Mar 2006 09:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-05T09:44:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Mar 2006 15:59:30 +0000">
+ <metadata tag="submitter" timestamp="2006-03-05T15:59:30Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-05.xml b/glsa-200603-05.xml
index 033a4b7a..89cdeb57 100644
--- a/glsa-200603-05.xml
+++ b/glsa-200603-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-05">
<title>zoo: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code through malicious ZOO archives.
</synopsis>
<product type="ebuild">zoo</product>
- <announced>March 06, 2006</announced>
- <revised>March 06, 2006: 01</revised>
+ <announced>2006-03-06</announced>
+ <revised>2006-03-06: 01</revised>
<bug>123782</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zoo-2.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zoo-2.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855">CVE-2006-0855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855">CVE-2006-0855</uri>
<uri link="http://www.guay-leroux.com/projects/zoo-advisory.txt">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Feb 2006 17:26:29 +0000">
+ <metadata tag="requester" timestamp="2006-02-26T17:26:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 17:54:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T17:54:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Mar 2006 16:06:52 +0000">
+ <metadata tag="submitter" timestamp="2006-03-04T16:06:52Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-06.xml b/glsa-200603-06.xml
index d5967960..743fd062 100644
--- a/glsa-200603-06.xml
+++ b/glsa-200603-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-06">
<title>GNU tar: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">tar</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>123038</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.15.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.15.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300">CVE-2006-0300</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300">CVE-2006-0300</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 07 Mar 2006 20:43:28 +0000">
+ <metadata tag="requester" timestamp="2006-03-07T20:43:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Mar 2006 16:57:53 +0000">
+ <metadata tag="submitter" timestamp="2006-03-08T16:57:53Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Mar 2006 18:23:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-10T18:23:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-07.xml b/glsa-200603-07.xml
index 84fc016a..13d9fd53 100644
--- a/glsa-200603-07.xml
+++ b/glsa-200603-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-07">
<title>flex: Potential insecure code generation</title>
<synopsis>
@@ -8,8 +7,8 @@
such scanners vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">flex</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>122940</bug>
<access>remote and local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/flex-2.5.33-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/flex-2.5.33-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0459">CVE-2006-0459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0459">CVE-2006-0459</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Mar 2006 18:28:11 +0000">
+ <metadata tag="requester" timestamp="2006-03-03T18:28:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 18:29:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T18:29:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Mar 2006 21:06:21 +0000">
+ <metadata tag="submitter" timestamp="2006-03-07T21:06:21Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-08.xml b/glsa-200603-08.xml
index e4f1315d..912f171f 100644
--- a/glsa-200603-08.xml
+++ b/glsa-200603-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-08">
<title>GnuPG: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
digital signature.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>125217</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.2.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049">CVE-2006-0049</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049">CVE-2006-0049</uri>
<uri link="http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html">GnuPG Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Mar 2006 22:34:09 +0000">
+ <metadata tag="submitter" timestamp="2006-03-08T22:34:09Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Mar 2006 21:32:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-10T21:32:19Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-09.xml b/glsa-200603-09.xml
index f7356de1..47832c44 100644
--- a/glsa-200603-09.xml
+++ b/glsa-200603-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-09">
<title>SquirrelMail: Cross-site scripting and IMAP command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
and IMAP command injection.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>March 12, 2006</announced>
- <revised>March 12, 2006: 01</revised>
+ <announced>2006-03-12</announced>
+ <revised>2006-03-12: 01</revised>
<bug>123781</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.6"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0188">CVE-2006-0188</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195">CVE-2006-0195</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377">CVE-2006-0377</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0188">CVE-2006-0188</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195">CVE-2006-0195</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377">CVE-2006-0377</uri>
</references>
<metadata tag="">
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Mar 2006 16:55:59 +0000">
+ <metadata tag="submitter" timestamp="2006-03-11T16:55:59Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Mar 2006 21:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-11T21:38:55Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-10.xml b/glsa-200603-10.xml
index 8d84ed7e..3c71d00a 100644
--- a/glsa-200603-10.xml
+++ b/glsa-200603-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-10">
<title>Cube: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">cube</product>
- <announced>March 13, 2006</announced>
- <revised>March 13, 2006: 01</revised>
+ <announced>2006-03-13</announced>
+ <revised>2006-03-13: 01</revised>
<bug>125289</bug>
<access>remote</access>
<affected>
@@ -58,14 +57,14 @@
# emerge --ask --unmerge games-fps/cube</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1100">CVE-2006-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1101">CVE-2006-1101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1102">CVE-2006-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1100">CVE-2006-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1101">CVE-2006-1101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1102">CVE-2006-1102</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 11 Mar 2006 12:37:07 +0000">
+ <metadata tag="submitter" timestamp="2006-03-11T12:37:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Mar 2006 16:16:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-11T16:16:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-11.xml b/glsa-200603-11.xml
index 761a0ecd..60f0625d 100644
--- a/glsa-200603-11.xml
+++ b/glsa-200603-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-11">
<title>Freeciv: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attack.
</synopsis>
<product type="ebuild">freeciv</product>
- <announced>March 16, 2006</announced>
- <revised>March 16, 2006: 01</revised>
+ <announced>2006-03-16</announced>
+ <revised>2006-03-16: 01</revised>
<bug>125304</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/freeciv-2.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/freeciv-2.0.8"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0047">CVE-2006-0047</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0047">CVE-2006-0047</uri>
<uri link="http://aluigi.altervista.org/adv/freecivdos-adv.txt">Original advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 12 Mar 2006 20:13:19 +0000">
+ <metadata tag="submitter" timestamp="2006-03-12T20:13:19Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 20:29:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T20:29:12Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200603-12.xml b/glsa-200603-12.xml
index f3b2774c..ad1e4ff1 100644
--- a/glsa-200603-12.xml
+++ b/glsa-200603-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-12">
<title>zoo: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
creating archives of specially crafted directories and files.
</synopsis>
<product type="ebuild">zoo</product>
- <announced>March 16, 2006</announced>
- <revised>March 16, 2006: 01</revised>
+ <announced>2006-03-16</announced>
+ <revised>2006-03-16: 01</revised>
<bug>125622</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zoo-2.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zoo-2.10-r2"</code>
</resolution>
<references>
<uri link="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426">RedHat Bug #183426</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269">CVE-2006-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269">CVE-2006-1269</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Mar 2006 11:35:08 +0000">
+ <metadata tag="requester" timestamp="2006-03-11T11:35:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Mar 2006 16:19:21 +0000">
+ <metadata tag="submitter" timestamp="2006-03-12T16:19:21Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 17:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T17:50:06Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200603-13.xml b/glsa-200603-13.xml
index d36156ca..3941eaba 100644
--- a/glsa-200603-13.xml
+++ b/glsa-200603-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-13">
<title>PEAR-Auth: Potential authentication bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
authentication.
</synopsis>
<product type="ebuild">pear-auth</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>123832</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-Auth-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-Auth-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0868">CVE-2006-0868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0868">CVE-2006-0868</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:29:18 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:29:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:29:45 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:29:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Mar 2006 23:22:04 +0000">
+ <metadata tag="submitter" timestamp="2006-03-14T23:22:04Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200603-14.xml b/glsa-200603-14.xml
index 5b4b9ae3..3cb729f2 100644
--- a/glsa-200603-14.xml
+++ b/glsa-200603-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-14">
<title>Heimdal: rshd privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
elevate privileges.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>121839</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582">CVE-2006-0582</uri>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2006-02-06/">Heimdal Advisory 2006-02-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582">CVE-2006-0582</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2006-02-06/">Heimdal Advisory 2006-02-06</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 18:02:33 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T18:02:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Mar 2006 09:34:15 +0000">
+ <metadata tag="submitter" timestamp="2006-03-16T09:34:15Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Mar 2006 10:14:03 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-17T10:14:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200603-15.xml b/glsa-200603-15.xml
index 06bdd9b5..527a2e31 100644
--- a/glsa-200603-15.xml
+++ b/glsa-200603-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-15">
<title>Crypt::CBC: Insecure initialization vector</title>
<synopsis>
@@ -8,8 +7,8 @@
a weaker encryption.
</synopsis>
<product type="ebuild">crypt-cbc</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>126048</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/crypt-cbc-2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/crypt-cbc-2.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898">CVE-2006-0898</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898">CVE-2006-0898</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:26:26 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:26:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:26:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:26:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Mar 2006 23:04:56 +0000">
+ <metadata tag="submitter" timestamp="2006-03-14T23:04:56Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200603-16.xml b/glsa-200603-16.xml
index 7b0e76a2..81d232e2 100644
--- a/glsa-200603-16.xml
+++ b/glsa-200603-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-16">
<title>Metamail: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">metamail</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>126052</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/metamail-2.7.45.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/metamail-2.7.45.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0709">CVE-2006-0709</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0709">CVE-2006-0709</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:16:22 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:16:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Mar 2006 09:48:07 +0000">
+ <metadata tag="submitter" timestamp="2006-03-16T09:48:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Mar 2006 21:04:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-16T21:04:49Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-17.xml b/glsa-200603-17.xml
index 88cbeea2..b3430d45 100644
--- a/glsa-200603-17.xml
+++ b/glsa-200603-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-17">
<title>PeerCast: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>123432</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1217&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1217"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1148">CVE-2006-1148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1148">CVE-2006-1148</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Mar 2006 11:34:53 +0000">
+ <metadata tag="requester" timestamp="2006-03-11T11:34:53Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 17:55:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T17:55:02Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 02:16:00 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T02:16:00Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200603-18.xml b/glsa-200603-18.xml
index 77e9b19b..f3f048ec 100644
--- a/glsa-200603-18.xml
+++ b/glsa-200603-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-18">
<title>Pngcrush: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">pngcrush</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>123286</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/pngcrush-1.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/pngcrush-1.6.2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849">CVE-2005-1849</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849">CVE-2005-1849</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Feb 2006 18:06:23 +0000">
+ <metadata tag="requester" timestamp="2006-02-22T18:06:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 17:03:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T17:03:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 02:00:13 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T02:00:13Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200603-19.xml b/glsa-200603-19.xml
index 4d5fff83..b4e20d34 100644
--- a/glsa-200603-19.xml
+++ b/glsa-200603-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-19">
<title>cURL/libcurl: Buffer overflow in the handling of TFTP URLs</title>
<synopsis>
@@ -8,8 +7,8 @@
TFTP protocol, which could be exploited to compromise a user's system.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>125766</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.1-r1"</code>
</resolution>
<references>
- <uri link="http://curl.haxx.se/docs/adv_20060320.html">Project cURL Security Advisory, March 20th 2006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061">CVE-2006-1061</uri>
+ <uri link="https://curl.haxx.se/docs/adv_20060320.html">Project cURL Security Advisory, March 20th 2006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061">CVE-2006-1061</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Mar 2006 17:27:58 +0000">
+ <metadata tag="requester" timestamp="2006-03-20T17:27:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Mar 2006 17:28:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-20T17:28:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Mar 2006 22:09:32 +0000">
+ <metadata tag="submitter" timestamp="2006-03-20T22:09:32Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200603-20.xml b/glsa-200603-20.xml
index e9ab680c..dc97c0d8 100644
--- a/glsa-200603-20.xml
+++ b/glsa-200603-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-20">
<title>Macromedia Flash Player: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
a user's system via the handling of malicious SWF files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>March 21, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-03-21</announced>
+ <revised>2009-05-28: 02</revised>
<bug>102777</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.63&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.63"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024">CVE-2006-0024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024">CVE-2006-0024</uri>
<uri link="http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html">Macromedia Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Mar 2006 19:42:52 +0000">
+ <metadata tag="submitter" timestamp="2006-03-21T19:42:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Mar 2006 19:43:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-21T19:43:49Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200603-21.xml b/glsa-200603-21.xml
index 68e74c36..a06f19bc 100644
--- a/glsa-200603-21.xml
+++ b/glsa-200603-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-21">
<title>Sendmail: Race condition in the handling of asynchronous signals</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with sendmail privileges.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>March 22, 2006</announced>
- <revised>March 22, 2006: 01</revised>
+ <announced>2006-03-22</announced>
+ <revised>2006-03-22: 01</revised>
<bug>125623</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/sendmail-8.13.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/sendmail-8.13.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058">CVE-2006-0058</uri>
- <uri link="http://www.sendmail.com/company/advisory/index.shtml">Sendmail Inc. advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058">CVE-2006-0058</uri>
+ <uri link="https://www.sendmail.com/company/advisory/index.shtml">Sendmail Inc. advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Mar 2006 20:21:08 +0000">
+ <metadata tag="submitter" timestamp="2006-03-21T20:21:08Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Mar 2006 19:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-22T19:48:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200603-22.xml b/glsa-200603-22.xml
index f146d9e6..50492253 100644
--- a/glsa-200603-22.xml
+++ b/glsa-200603-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-22">
<title>PHP: Format string and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>March 22, 2006</announced>
- <revised>March 22, 2006: 01</revised>
+ <announced>2006-03-22</announced>
+ <revised>2006-03-22: 01</revised>
<bug>125878</bug>
<access>remote</access>
<affected>
@@ -63,27 +62,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.2"</code>
<p>
All PHP 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207">CVE-2006-0207</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208">CVE-2006-0208</uri>
- <uri link="http://www.hardened-php.net/advisory_022006.112.html">Hardened-PHP Advisory 01/2006</uri>
- <uri link="http://www.hardened-php.net/advisory_012006.113.html">Hardened-PHP Advisory 02/2006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207">CVE-2006-0207</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208">CVE-2006-0208</uri>
+ <uri link="https://www.hardened-php.net/advisory_022006.112.html">Hardened-PHP Advisory 01/2006</uri>
+ <uri link="https://www.hardened-php.net/advisory_012006.113.html">Hardened-PHP Advisory 02/2006</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:28:04 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:28:04Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:28:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:28:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 03:27:49 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T03:27:49Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200603-23.xml b/glsa-200603-23.xml
index 2d5c78de..bcbbd9d7 100644
--- a/glsa-200603-23.xml
+++ b/glsa-200603-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-23">
<title>NetHack, Slash'EM, Falcon's Eye: Local privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code as other users.
</synopsis>
<product type="ebuild">nethack slashem falconseye</product>
- <announced>March 23, 2006</announced>
- <revised>March 30, 2006: 01</revised>
+ <announced>2006-03-23</announced>
+ <revised>2006-03-30: 01</revised>
<bug>125902</bug>
<bug>122376</bug>
<bug>127167</bug>
@@ -62,32 +61,32 @@
until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/nethack&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/nethack"</code>
<p>
Slash'EM has been masked in Portage pending the resolution of these
issues. Vulnerable Slash'EM users are advised to uninstall the package
until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/slashem&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/slashem"</code>
<p>
Falcon's Eye has been masked in Portage pending the resolution of these
issues. Vulnerable Falcon's Eye users are advised to uninstall the
package until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/falconseye&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/falconseye"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1390">CVE-2006-1390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1390">CVE-2006-1390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Mar 2006 22:13:28 +0000">
+ <metadata tag="requester" timestamp="2006-03-22T22:13:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Mar 2006 22:57:23 +0000">
+ <metadata tag="submitter" timestamp="2006-03-22T22:57:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Mar 2006 22:05:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-23T22:05:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200603-24.xml b/glsa-200603-24.xml
index 3d658cfa..4b72fb3b 100644
--- a/glsa-200603-24.xml
+++ b/glsa-200603-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-24">
<title>RealPlayer: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">RealPlayer</product>
- <announced>March 26, 2006</announced>
- <revised>March 26, 2006: 01</revised>
+ <announced>2006-03-26</announced>
+ <revised>2006-03-26: 01</revised>
<bug>127352</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323">CVE-2006-0323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323">CVE-2006-0323</uri>
<uri link="http://service.real.com/realplayer/security/03162006_player/en/">RealNetworks Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Mar 2006 23:38:12 +0000">
+ <metadata tag="requester" timestamp="2006-03-23T23:38:12Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Mar 2006 13:36:18 +0000">
+ <metadata tag="submitter" timestamp="2006-03-24T13:36:18Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Mar 2006 17:28:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-26T17:28:15Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200603-25.xml b/glsa-200603-25.xml
index bbabbd8e..aede63ba 100644
--- a/glsa-200603-25.xml
+++ b/glsa-200603-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-25">
<title>OpenOffice.org: Heap overflow in included libcurl</title>
<synopsis>
@@ -8,8 +7,8 @@
heap overflow when parsing URLs.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>March 27, 2006</announced>
- <revised>March 27, 2006: 01</revised>
+ <announced>2006-03-27</announced>
+ <revised>2006-03-27: 01</revised>
<bug>126433</bug>
<access>remote</access>
<affected>
@@ -57,26 +56,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.0.2"</code>
<p>
All OpenOffice.org users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
- <uri link="http://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory 24/2005</uri>
- <uri link="/security/en/glsa/glsa-200512-09.xml">GLSA 200512-09</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
+ <uri link="https://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory 24/2005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-09.xml">GLSA 200512-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Mar 2006 09:53:36 +0000">
+ <metadata tag="requester" timestamp="2006-03-17T09:53:36Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Mar 2006 18:15:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-17T18:15:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 01:42:41 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T01:42:41Z">
adir
</metadata>
</glsa>
diff --git a/glsa-200603-26.xml b/glsa-200603-26.xml
index 732fb11c..843ef457 100644
--- a/glsa-200603-26.xml
+++ b/glsa-200603-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-26">
<title>bsd-games: Local privilege escalation in tetris-bsd</title>
<synopsis>
tetris-bsd is prone to local privilege escalation vulnerabilities.
</synopsis>
<product type="ebuild">bsd-games</product>
- <announced>March 29, 2006</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2006-03-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>122399</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-misc/bsd-games-2.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-misc/bsd-games-2.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1539">CVE-2006-1539</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1539">CVE-2006-1539</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Mar 2006 19:50:34 +0000">
+ <metadata tag="requester" timestamp="2006-03-21T19:50:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Mar 2006 15:36:51 +0000">
+ <metadata tag="submitter" timestamp="2006-03-27T15:36:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Mar 2006 18:00:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-28T18:00:28Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200604-01.xml b/glsa-200604-01.xml
index 29c27606..d62bef57 100644
--- a/glsa-200604-01.xml
+++ b/glsa-200604-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-01">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127971</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.4.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.4.15"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1498">CVE-2006-1498</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=404869">MediaWiki 1.4.15 Release Notes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1498">CVE-2006-1498</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=404869">MediaWiki 1.4.15 Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Apr 2006 08:58:31 +0000">
+ <metadata tag="requester" timestamp="2006-04-02T08:58:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Apr 2006 08:58:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-02T08:58:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Apr 2006 17:15:00 +0000">
+ <metadata tag="submitter" timestamp="2006-04-02T17:15:00Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200604-02.xml b/glsa-200604-02.xml
index df7eb2b1..1ddcc665 100644
--- a/glsa-200604-02.xml
+++ b/glsa-200604-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-02">
<title>Horde Application Framework: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary remote code.
</synopsis>
<product type="ebuild">horde</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127889</bug>
<bug>126435</bug>
<access>remote</access>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1260">CVE-2006-1260</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1491">CVE-2006-1491</uri>
- <uri link="http://lists.horde.org/archives/announce/2006/000271.html">Horde Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1260">CVE-2006-1260</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1491">CVE-2006-1491</uri>
+ <uri link="https://lists.horde.org/archives/announce/2006/000271.html">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Mar 2006 23:07:49 +0000">
+ <metadata tag="requester" timestamp="2006-03-31T23:07:49Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 03 Apr 2006 09:02:34 +0000">
+ <metadata tag="submitter" timestamp="2006-04-03T09:02:34Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Apr 2006 18:34:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-04T18:34:51Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200604-03.xml b/glsa-200604-03.xml
index 0c1a7624..ac289f72 100644
--- a/glsa-200604-03.xml
+++ b/glsa-200604-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-03">
<title>FreeRADIUS: Authentication bypass in EAP-MSCHAPv2 module</title>
<synopsis>
@@ -8,8 +7,8 @@
which causes some authentication checks to be bypassed.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127229</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354">CVE-2006-1354</uri>
- <uri link="http://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354">CVE-2006-1354</uri>
+ <uri link="https://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Apr 2006 10:41:34 +0000">
+ <metadata tag="requester" timestamp="2006-04-01T10:41:34Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Apr 2006 10:42:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-01T10:42:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 01 Apr 2006 23:30:58 +0000">
+ <metadata tag="submitter" timestamp="2006-04-01T23:30:58Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200604-04.xml b/glsa-200604-04.xml
index 7519fd1e..f01bd4ae 100644
--- a/glsa-200604-04.xml
+++ b/glsa-200604-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-04">
<title>Kaffeine: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">kaffeine</product>
- <announced>April 05, 2006</announced>
- <revised>April 05, 2006: 01</revised>
+ <announced>2006-04-05</announced>
+ <revised>2006-04-05: 01</revised>
<bug>127326</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/kaffeine-0.7.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/kaffeine-0.7.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0051">CVE-2006-0051</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060404-1.txt">KDE Security Advisory: Kaffeine buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0051">CVE-2006-0051</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060404-1.txt">KDE Security Advisory: Kaffeine buffer overflow</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Apr 2006 13:17:18 +0000">
+ <metadata tag="requester" timestamp="2006-04-04T13:17:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Apr 2006 19:29:42 +0000">
+ <metadata tag="submitter" timestamp="2006-04-04T19:29:42Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Apr 2006 21:13:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-05T21:13:35Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200604-05.xml b/glsa-200604-05.xml
index 594b35ce..c5c9db5b 100644
--- a/glsa-200604-05.xml
+++ b/glsa-200604-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-05">
<title>Doomsday: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">doomsday</product>
- <announced>April 06, 2006</announced>
- <revised>June 15, 2006: 02</revised>
+ <announced>2006-04-06</announced>
+ <revised>2006-06-15: 02</revised>
<bug>128690</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/doomsday-1.9.0_beta4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/doomsday-1.9.0_beta4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1618">CVE-2006-1618</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1618">CVE-2006-1618</uri>
<uri link="http://aluigi.altervista.org/adv/doomsdayfs-adv.txt">Original advisory by Luigi Auriemma</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Apr 2006 04:57:40 +0000">
+ <metadata tag="requester" timestamp="2006-04-04T04:57:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Apr 2006 10:51:26 +0000">
+ <metadata tag="submitter" timestamp="2006-04-04T10:51:26Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Apr 2006 12:10:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-04T12:10:41Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200604-06.xml b/glsa-200604-06.xml
index c18346c2..2fc08104 100644
--- a/glsa-200604-06.xml
+++ b/glsa-200604-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-06">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or cause an application crash.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>April 07, 2006</announced>
- <revised>April 07, 2006: 01</revised>
+ <announced>2006-04-07</announced>
+ <revised>2006-04-07: 01</revised>
<bug>128963</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614">CVE-2006-1614</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615">CVE-2006-1615</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630">CVE-2006-1630</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614">CVE-2006-1614</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615">CVE-2006-1615</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630">CVE-2006-1630</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 06 Apr 2006 18:09:01 +0000">
+ <metadata tag="submitter" timestamp="2006-04-06T18:09:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Apr 2006 19:35:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-07T19:35:00Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200604-07.xml b/glsa-200604-07.xml
index 2519553f..38f4823b 100644
--- a/glsa-200604-07.xml
+++ b/glsa-200604-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-07">
<title>Cacti: Multiple vulnerabilities in included ADOdb</title>
<synopsis>
@@ -8,8 +7,8 @@
in Cacti, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Cacti</product>
- <announced>April 14, 2006</announced>
- <revised>April 14, 2006: 01</revised>
+ <announced>2006-04-14</announced>
+ <revised>2006-04-14: 01</revised>
<bug>129284</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 13 Apr 2006 06:13:49 +0000">
+ <metadata tag="requester" timestamp="2006-04-13T06:13:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Apr 2006 16:58:52 +0000">
+ <metadata tag="submitter" timestamp="2006-04-13T16:58:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Apr 2006 20:36:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-13T20:36:27Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200604-08.xml b/glsa-200604-08.xml
index ba9dd6e9..4b87ad53 100644
--- a/glsa-200604-08.xml
+++ b/glsa-200604-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-08">
<title>libapreq2: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">libapreq2</product>
- <announced>April 17, 2006</announced>
- <revised>April 17, 2006: 01</revised>
+ <announced>2006-04-17</announced>
+ <revised>2006-04-17: 01</revised>
<bug>128610</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/libapreq2-2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/libapreq2-2.07"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0042">CVE-2006-0042</uri>
- <uri link="http://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&amp;view=markup">libapreq2 Changes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0042">CVE-2006-0042</uri>
+ <uri link="https://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&amp;view=markup">libapreq2 Changes</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Apr 2006 19:33:11 +0000">
+ <metadata tag="requester" timestamp="2006-04-09T19:33:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Apr 2006 17:20:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-11T17:20:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Apr 2006 19:11:49 +0000">
+ <metadata tag="submitter" timestamp="2006-04-13T19:11:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200604-09.xml b/glsa-200604-09.xml
index 2d414044..45e0c9d3 100644
--- a/glsa-200604-09.xml
+++ b/glsa-200604-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-09">
<title>Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>April 21, 2006</announced>
- <revised>April 21, 2006: 01</revised>
+ <announced>2006-04-21</announced>
+ <revised>2006-04-21: 01</revised>
<bug>129523</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/cyrus-sasl-2.1.21-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/cyrus-sasl-2.1.21-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721">CVE-2006-1721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721">CVE-2006-1721</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Apr 2006 12:54:10 +0000">
+ <metadata tag="requester" timestamp="2006-04-15T12:54:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Apr 2006 16:43:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-17T16:43:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Apr 2006 16:06:22 +0000">
+ <metadata tag="submitter" timestamp="2006-04-20T16:06:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200604-10.xml b/glsa-200604-10.xml
index a76b8b18..0044ea74 100644
--- a/glsa-200604-10.xml
+++ b/glsa-200604-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-10">
<title>zgv, xzgv: Heap overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">xzgv</product>
- <announced>April 21, 2006</announced>
- <revised>June 10, 2006: 02</revised>
+ <announced>2006-04-21</announced>
+ <revised>2006-06-10: 02</revised>
<bug>127008</bug>
<access>remote</access>
<affected>
@@ -56,25 +55,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xzgv-0.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xzgv-0.8-r2"</code>
<p>
All zgv users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/zgv-5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/zgv-5.9"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1060">CVE-2006-1060</uri>
- <uri link="http://www.svgalib.org/rus/zgv/">homepage plus Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1060">CVE-2006-1060</uri>
+ <uri link="https://www.svgalib.org/rus/zgv/">homepage plus Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Apr 2006 14:45:12 +0000">
+ <metadata tag="requester" timestamp="2006-04-07T14:45:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Apr 2006 20:39:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-14T20:39:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Apr 2006 16:13:24 +0000">
+ <metadata tag="submitter" timestamp="2006-04-20T16:13:24Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200604-11.xml b/glsa-200604-11.xml
index f6217d58..a64b6b2b 100644
--- a/glsa-200604-11.xml
+++ b/glsa-200604-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-11">
<title>Crossfire server: Denial of Service and potential arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially to the execution of arbitrary code.
</synopsis>
<product type="ebuild">Crossfire</product>
- <announced>April 22, 2006</announced>
- <revised>April 22, 2006: 01</revised>
+ <announced>2006-04-22</announced>
+ <revised>2006-04-22: 01</revised>
<bug>126169</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-server/crossfire-server-1.9.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-server/crossfire-server-1.9.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1010">CVE-2006-1010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1010">CVE-2006-1010</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 16:56:02 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T16:56:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Apr 2006 16:56:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-21T16:56:22Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 08:20:53 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T08:20:53Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200604-12.xml b/glsa-200604-12.xml
index 78c82817..07099540 100644
--- a/glsa-200604-12.xml
+++ b/glsa-200604-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-12">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>129924</bug>
<access>remote</access>
<affected>
@@ -55,44 +54,44 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.8"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 20:40:23 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T20:40:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Apr 2006 20:48:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-22T20:48:17Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200604-13.xml b/glsa-200604-13.xml
index 16cf9d74..2c19e27c 100644
--- a/glsa-200604-13.xml
+++ b/glsa-200604-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-13">
<title>fbida: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fbida</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>129470</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/fbida-2.03-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/fbida-2.03-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1695">CVE-2006-1695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1695">CVE-2006-1695</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 15:53:11 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T15:53:11Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Apr 2006 16:54:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-21T16:54:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 21:26:19 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T21:26:19Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200604-14.xml b/glsa-200604-14.xml
index 60a2f696..91152592 100644
--- a/glsa-200604-14.xml
+++ b/glsa-200604-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-14">
<title>Dia: Arbitrary code execution through XFig import</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>128107</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.94-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550">CVE-2006-1550</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550">CVE-2006-1550</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Apr 2006 17:58:09 +0000">
+ <metadata tag="requester" timestamp="2006-04-22T17:58:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Apr 2006 17:58:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-22T17:58:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 20:01:59 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T20:01:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200604-15.xml b/glsa-200604-15.xml
index a6cde25b..8fda099f 100644
--- a/glsa-200604-15.xml
+++ b/glsa-200604-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-15">
<title>xine-ui: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xine-ui</product>
- <announced>April 26, 2006</announced>
- <revised>April 26, 2006: 01</revised>
+ <announced>2006-04-26</announced>
+ <revised>2006-04-26: 01</revised>
<bug>130801</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/xine-ui-0.99.4-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/xine-ui-0.99.4-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1905">CVE-2006-1905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1905">CVE-2006-1905</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Apr 2006 18:05:30 +0000">
+ <metadata tag="requester" timestamp="2006-04-22T18:05:30Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 00:24:14 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T00:24:14Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Apr 2006 05:57:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-25T05:57:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200604-16.xml b/glsa-200604-16.xml
index 107af432..61331ef5 100644
--- a/glsa-200604-16.xml
+++ b/glsa-200604-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-16">
<title>xine-lib: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 26, 2006</announced>
- <revised>April 26, 2006: 01</revised>
+ <announced>2006-04-26</announced>
+ <revised>2006-04-26: 01</revised>
<bug>128838</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2_pre20060328-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2_pre20060328-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 20:35:23 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T20:35:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 00:46:13 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T00:46:13Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Apr 2006 16:31:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-24T16:31:50Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200604-17.xml b/glsa-200604-17.xml
index 8cf94c2d..a94cd090 100644
--- a/glsa-200604-17.xml
+++ b/glsa-200604-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-17">
<title>Ethereal: Multiple vulnerabilities in protocol dissectors</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>April 27, 2006</announced>
- <revised>April 27, 2006: 01</revised>
+ <announced>2006-04-27</announced>
+ <revised>2006-04-27: 01</revised>
<bug>130505</bug>
<access>remote</access>
<affected>
@@ -59,24 +58,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.99.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.99.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932">CVE-2006-1932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933">CVE-2006-1933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934">CVE-2006-1934</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935">CVE-2006-1935</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936">CVE-2006-1936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937">CVE-2006-1937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938">CVE-2006-1938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939">CVE-2006-1939</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940">CVE-2006-1940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932">CVE-2006-1932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933">CVE-2006-1933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934">CVE-2006-1934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935">CVE-2006-1935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936">CVE-2006-1936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937">CVE-2006-1937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938">CVE-2006-1938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939">CVE-2006-1939</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940">CVE-2006-1940</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00023.html">Ethereal enpa-sa-00023</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Apr 2006 11:35:49 +0000">
+ <metadata tag="submitter" timestamp="2006-04-25T11:35:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Apr 2006 05:10:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-27T05:10:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200604-18.xml b/glsa-200604-18.xml
index 266b620d..44eb4025 100644
--- a/glsa-200604-18.xml
+++ b/glsa-200604-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-18">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>April 28, 2006</announced>
- <revised>April 28, 2006: 01</revised>
+ <announced>2006-04-28</announced>
+ <revised>2006-04-28: 01</revised>
<bug>130887</bug>
<access>remote</access>
<affected>
@@ -55,50 +54,50 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.13"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0293">CVE-2006-0293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0293">CVE-2006-0293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Apr 2006 16:32:37 +0000">
+ <metadata tag="requester" timestamp="2006-04-24T16:32:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Apr 2006 22:51:13 +0000">
+ <metadata tag="submitter" timestamp="2006-04-24T22:51:13Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Apr 2006 17:28:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-26T17:28:01Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-01.xml b/glsa-200605-01.xml
index 30d1523f..f4bfaec1 100644
--- a/glsa-200605-01.xml
+++ b/glsa-200605-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-01">
<title>MPlayer: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
buffer overflow.
</synopsis>
<product type="ebuild">mplayer mplayer-bin</product>
- <announced>May 01, 2006</announced>
- <revised>June 21, 2006: 02</revised>
+ <announced>2006-05-01</announced>
+ <revised>2006-06-21: 02</revised>
<bug>127969</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20060415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20060415"</code>
<p>
All MPlayer binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-bin-1.0.20060415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-bin-1.0.20060415"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1502">CVE-2006-1502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1502">CVE-2006-1502</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Apr 2006 10:59:36 +0000">
+ <metadata tag="requester" timestamp="2006-04-09T10:59:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 01:03:22 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T01:03:22Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Apr 2006 14:44:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-30T14:44:19Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200605-02.xml b/glsa-200605-02.xml
index 0435d3cc..6276f85c 100644
--- a/glsa-200605-02.xml
+++ b/glsa-200605-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-02">
<title>X.Org: Buffer overflow in XRender extension</title>
<synopsis>
@@ -8,8 +7,8 @@
user to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>130979</bug>
<access>local</access>
<affected>
@@ -46,15 +45,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.8.2-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.8.2-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 01 May 2006 14:14:06 +0000">
+ <metadata tag="submitter" timestamp="2006-05-01T14:14:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 17:42:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T17:42:54Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200605-03.xml b/glsa-200605-03.xml
index fafb06fe..b0404cc3 100644
--- a/glsa-200605-03.xml
+++ b/glsa-200605-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-03">
<title>ClamAV: Buffer overflow in Freshclam</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>131791</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1989">CVE-2006-1989</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1989">CVE-2006-1989</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 02 May 2006 04:03:38 +0000">
+ <metadata tag="submitter" timestamp="2006-05-02T04:03:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 04:54:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T04:54:25Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200605-04.xml b/glsa-200605-04.xml
index e3f89cea..86afe2bb 100644
--- a/glsa-200605-04.xml
+++ b/glsa-200605-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-04">
<title>phpWebSite: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>130295</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 May 2006 10:33:24 +0000">
+ <metadata tag="requester" timestamp="2006-05-01T10:33:24Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 May 2006 10:58:55 +0000">
+ <metadata tag="submitter" timestamp="2006-05-01T10:58:55Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 May 2006 11:02:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-01T11:02:34Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200605-05.xml b/glsa-200605-05.xml
index 1c017690..5440f663 100644
--- a/glsa-200605-05.xml
+++ b/glsa-200605-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-05">
<title>rsync: Potential integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code on an rsync server.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>May 06, 2006</announced>
- <revised>May 06, 2006: 01</revised>
+ <announced>2006-05-06</announced>
+ <revised>2006-05-06: 01</revised>
<bug>131631</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083">CVE-2006-2083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083">CVE-2006-2083</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 May 2006 15:25:29 +0000">
+ <metadata tag="requester" timestamp="2006-05-02T15:25:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 16:18:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T16:18:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 May 2006 20:00:28 +0000">
+ <metadata tag="submitter" timestamp="2006-05-04T20:00:28Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-06.xml b/glsa-200605-06.xml
index d9b657ea..ac9abe50 100644
--- a/glsa-200605-06.xml
+++ b/glsa-200605-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-06">
<title>Mozilla Firefox: Potential remote code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>May 06, 2006</announced>
- <revised>May 06, 2006: 01</revised>
+ <announced>2006-05-06</announced>
+ <revised>2006-05-06: 01</revised>
<bug>131138</bug>
<access>remote</access>
<affected>
@@ -60,25 +59,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.3"</code>
<p>
All Mozilla Firefox 1.5 binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993">CVE-2006-1993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993">CVE-2006-1993</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 May 2006 16:54:02 +0000">
+ <metadata tag="requester" timestamp="2006-05-04T16:54:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 May 2006 18:30:27 +0000">
+ <metadata tag="submitter" timestamp="2006-05-05T18:30:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 13:15:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T13:15:08Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200605-07.xml b/glsa-200605-07.xml
index 67eab2ee..19b481f4 100644
--- a/glsa-200605-07.xml
+++ b/glsa-200605-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-07">
<title>Nagios: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">nagios</product>
- <announced>May 07, 2006</announced>
- <revised>May 25, 2006: 03</revised>
+ <announced>2006-05-07</announced>
+ <revised>2006-05-25: 03</revised>
<bug>132159</bug>
<bug>133487</bug>
<access>remote</access>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-core-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-core-1.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162">CVE-2006-2162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2489">CVE-2006-2489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162">CVE-2006-2162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2489">CVE-2006-2489</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 May 2006 17:10:32 +0000">
+ <metadata tag="requester" timestamp="2006-05-04T17:10:32Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 May 2006 19:09:01 +0000">
+ <metadata tag="submitter" timestamp="2006-05-05T19:09:01Z">
fox2mike
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 04:21:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T04:21:12Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200605-08.xml b/glsa-200605-08.xml
index 0f428a33..49a8f321 100644
--- a/glsa-200605-08.xml
+++ b/glsa-200605-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-08">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
wordwrap() which may lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>May 08, 2006</announced>
- <revised>May 15, 2007: 09</revised>
+ <announced>2006-05-08</announced>
+ <revised>2007-05-15: 09</revised>
<bug>127939</bug>
<bug>128883</bug>
<bug>131135</bug>
@@ -74,18 +73,18 @@
# emerge --ask --oneshot --verbose dev-lang/php</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996">CVE-2006-0996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490">CVE-2006-1490</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990">CVE-2006-1990</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991">CVE-2006-1991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996">CVE-2006-0996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490">CVE-2006-1490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990">CVE-2006-1990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991">CVE-2006-1991</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 May 2006 20:33:13 +0000">
+ <metadata tag="requester" timestamp="2006-05-05T20:33:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 May 2006 09:55:35 +0000">
+ <metadata tag="submitter" timestamp="2006-05-06T09:55:35Z">
fox2mike
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:38:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:38:05Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-09.xml b/glsa-200605-09.xml
index 39de7dff..7d20d13e 100644
--- a/glsa-200605-09.xml
+++ b/glsa-200605-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-09">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
script execution with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>May 08, 2006</announced>
- <revised>May 08, 2006: 01</revised>
+ <announced>2006-05-08</announced>
+ <revised>2006-05-08: 01</revised>
<bug>130888</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.8"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.8"</code>
<p>
Note: There is no stable fixed version for the ALPHA
architecture yet. Users of Mozilla Thunderbird on ALPHA should consider
@@ -70,35 +69,35 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Apr 2006 16:32:56 +0000">
+ <metadata tag="requester" timestamp="2006-04-24T16:32:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Apr 2006 22:23:09 +0000">
+ <metadata tag="submitter" timestamp="2006-04-24T22:23:09Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 17:36:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T17:36:25Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-10.xml b/glsa-200605-10.xml
index 2d918a1f..05dedaeb 100644
--- a/glsa-200605-10.xml
+++ b/glsa-200605-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-10">
<title>pdnsd: Denial of Service and potential arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">pdnsd</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>131341</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdnsd-1.2.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdnsd-1.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2076">CVE-2006-2076</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2077">CVE-2006-2077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2076">CVE-2006-2076</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2077">CVE-2006-2077</uri>
</references>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 16:17:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T16:17:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 May 2006 10:55:02 +0000">
+ <metadata tag="submitter" timestamp="2006-05-07T10:55:02Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200605-11.xml b/glsa-200605-11.xml
index 4f66a89f..b47d2d57 100644
--- a/glsa-200605-11.xml
+++ b/glsa-200605-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-11">
<title>Ruby: Denial of Service</title>
<synopsis>
Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>130657</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931">CVE-2006-1931</uri>
- <uri link="http://www.ruby-lang.org/en/20051224.html">Ruby release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931">CVE-2006-1931</uri>
+ <uri link="https://www.ruby-lang.org/en/20051224.html">Ruby release announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 08 May 2006 06:23:42 +0000">
+ <metadata tag="submitter" timestamp="2006-05-08T06:23:42Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:21:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:21:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-12.xml b/glsa-200605-12.xml
index 50ca3902..b8553ce9 100644
--- a/glsa-200605-12.xml
+++ b/glsa-200605-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-12">
<title>Quake 3 engine based games: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">quake</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>132377</bug>
<access>remote</access>
<affected>
@@ -56,30 +55,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/quake3-bin-1.32c&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/quake3-bin-1.32c"</code>
<p>
All RTCW users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/rtcw-1.41b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/rtcw-1.41b"</code>
<p>
All Enemy Territory users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/enemy-territory-2.60b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/enemy-territory-2.60b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 May 2006 16:37:35 +0000">
+ <metadata tag="requester" timestamp="2006-05-09T16:37:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 May 2006 16:37:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-09T16:37:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 May 2006 17:21:13 +0000">
+ <metadata tag="submitter" timestamp="2006-05-09T17:21:13Z">
fox2mike
</metadata>
</glsa>
diff --git a/glsa-200605-13.xml b/glsa-200605-13.xml
index 6a5a63a8..7c9e318f 100644
--- a/glsa-200605-13.xml
+++ b/glsa-200605-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-13">
<title>MySQL: Information leakage</title>
<synopsis>
A MySQL server may leak information to unauthorized users.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 11, 2006</announced>
- <revised>May 15, 2006: 04</revised>
+ <announced>2006-05-11</announced>
+ <revised>2006-05-15: 04</revised>
<bug>132146</bug>
<access>remote</access>
<affected>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.27"</code>
</resolution>
<references>
<uri link="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2006-05/msg00041.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516">CVE-2006-1516</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517">CVE-2006-1517</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516">CVE-2006-1516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517">CVE-2006-1517</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 May 2006 16:33:38 +0000">
+ <metadata tag="requester" timestamp="2006-05-06T16:33:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 May 2006 07:03:06 +0000">
+ <metadata tag="submitter" timestamp="2006-05-08T07:03:06Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:21:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:21:08Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200605-14.xml b/glsa-200605-14.xml
index e9a385c4..81086457 100644
--- a/glsa-200605-14.xml
+++ b/glsa-200605-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-14">
<title>libextractor: Two heap-based buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libextractor</product>
- <announced>May 21, 2006</announced>
- <revised>May 21, 2006: 01</revised>
+ <announced>2006-05-21</announced>
+ <revised>2006-05-21: 01</revised>
<bug>133570</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458">CVE-2006-2458</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458">CVE-2006-2458</uri>
<uri link="http://aluigi.altervista.org/adv/libextho-adv.txt">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 19 May 2006 13:49:39 +0000">
+ <metadata tag="requester" timestamp="2006-05-19T13:49:39Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 May 2006 13:49:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-19T13:49:51Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 May 2006 16:16:14 +0000">
+ <metadata tag="submitter" timestamp="2006-05-19T16:16:14Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200605-15.xml b/glsa-200605-15.xml
index d8f690ea..f8eb63f9 100644
--- a/glsa-200605-15.xml
+++ b/glsa-200605-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-15">
<title>Quagga Routing Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
routing information. The BGP daemon is vulnerable to a Denial of Service.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>May 21, 2006</announced>
- <revised>May 21, 2006: 01</revised>
+ <announced>2006-05-21</announced>
+ <revised>2006-05-21: 01</revised>
<bug>132353</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/quagga-0.98.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/quagga-0.98.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223">CVE-2006-2223</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224">CVE-2006-2224</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2276">CVE-2006-2276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223">CVE-2006-2223</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224">CVE-2006-2224</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2276">CVE-2006-2276</uri>
<uri link="http://www.quagga.net/news2.php?y=2006&amp;m=5&amp;d=8#id1147115280">Official release information</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 May 2006 05:35:52 +0000">
+ <metadata tag="requester" timestamp="2006-05-15T05:35:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 May 2006 16:38:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-15T16:38:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 May 2006 05:49:19 +0000">
+ <metadata tag="submitter" timestamp="2006-05-16T05:49:19Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200605-16.xml b/glsa-200605-16.xml
index ec8868e8..8fa37684 100644
--- a/glsa-200605-16.xml
+++ b/glsa-200605-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-16">
<title>CherryPy: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to read arbitrary files.
</synopsis>
<product type="ebuild">cherrypy</product>
- <announced>May 30, 2006</announced>
- <revised>May 30, 2006: 01</revised>
+ <announced>2006-05-30</announced>
+ <revised>2006-05-30: 01</revised>
<bug>134273</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0847">CVE-2006-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0847">CVE-2006-0847</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 May 2006 09:02:22 +0000">
+ <metadata tag="requester" timestamp="2006-05-27T09:02:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 May 2006 09:02:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-27T09:02:32Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 May 2006 21:15:45 +0000">
+ <metadata tag="submitter" timestamp="2006-05-28T21:15:45Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200605-17.xml b/glsa-200605-17.xml
index 9be437b2..33b4034c 100644
--- a/glsa-200605-17.xml
+++ b/glsa-200605-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-17">
<title>libTIFF: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libtiff</product>
- <announced>May 30, 2006</announced>
- <revised>May 30, 2006: 01</revised>
+ <announced>2006-05-30</announced>
+ <revised>2006-05-30: 01</revised>
<bug>129675</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405">CVE-2006-0405</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024">CVE-2006-2024</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025">CVE-2006-2025</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026">CVE-2006-2026</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405">CVE-2006-0405</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024">CVE-2006-2024</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025">CVE-2006-2025</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026">CVE-2006-2026</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 May 2006 21:42:59 +0000">
+ <metadata tag="submitter" timestamp="2006-05-28T21:42:59Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 May 2006 21:43:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-28T21:43:06Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200606-01.xml b/glsa-200606-01.xml
index 21e987bf..c307b910 100644
--- a/glsa-200606-01.xml
+++ b/glsa-200606-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-01">
<title>Opera: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>129800</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-8.54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-8.54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1834">CVE-2006-1834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1834">CVE-2006-1834</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 30 May 2006 13:12:35 +0000">
+ <metadata tag="submitter" timestamp="2006-05-30T13:12:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 May 2006 19:39:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-31T19:39:23Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200606-02.xml b/glsa-200606-02.xml
index c8f25a6a..6433ac14 100644
--- a/glsa-200606-02.xml
+++ b/glsa-200606-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-02">
<title>shadow: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with escalated privileges.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>133615</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/shadow-4.0.15-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.0.15-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1174">CVE-2006-1174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1174">CVE-2006-1174</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:06:38 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:06:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Jun 2006 15:23:57 +0000">
+ <metadata tag="submitter" timestamp="2006-06-01T15:23:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:29Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-03.xml b/glsa-200606-03.xml
index d7df00d7..43421827 100644
--- a/glsa-200606-03.xml
+++ b/glsa-200606-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-03">
<title>Dia: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>133699</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.95.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.95.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2453">CVE-2006-2453</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2480">CVE-2006-2480</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2453">CVE-2006-2453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2480">CVE-2006-2480</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 May 2006 16:11:11 +0000">
+ <metadata tag="requester" timestamp="2006-05-30T16:11:11Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 30 May 2006 23:25:33 +0000">
+ <metadata tag="submitter" timestamp="2006-05-30T23:25:33Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:31 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:31Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-04.xml b/glsa-200606-04.xml
index 92a993a7..c373740a 100644
--- a/glsa-200606-04.xml
+++ b/glsa-200606-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-04">
<title>Tor: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure and information leak.
</synopsis>
<product type="ebuild">tor</product>
- <announced>June 07, 2006</announced>
- <revised>September 05, 2006: 02</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-09-05: 02</revised>
<bug>134329</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-misc/tor</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0414">CVE-2006-0414</uri>
- <uri link="http://tor.eff.org/cvs/tor/ChangeLog">Tor ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0414">CVE-2006-0414</uri>
+ <uri link="https://tor.eff.org/cvs/tor/ChangeLog">Tor ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:05:28 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:05:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Jun 2006 17:37:03 +0000">
+ <metadata tag="submitter" timestamp="2006-06-01T17:37:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:15:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:15:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-05.xml b/glsa-200606-05.xml
index 85082e57..35e2cec1 100644
--- a/glsa-200606-05.xml
+++ b/glsa-200606-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-05">
<title>Pound: HTTP request smuggling</title>
<synopsis>
@@ -8,8 +7,8 @@
bypass security restrictions or poison web caches.
</synopsis>
<product type="ebuild">pound</product>
- <announced>June 07, 2006</announced>
- <revised>November 24, 2006: 03</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-11-24: 03</revised>
<bug>118541</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose www-servers/pound</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3751">CVE-2005-3751</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3751">CVE-2005-3751</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 May 2006 15:47:49 +0000">
+ <metadata tag="requester" timestamp="2006-05-25T15:47:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 May 2006 18:03:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-25T18:03:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 May 2006 16:09:23 +0000">
+ <metadata tag="submitter" timestamp="2006-05-29T16:09:23Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200606-06.xml b/glsa-200606-06.xml
index b37239d4..7a362ab2 100644
--- a/glsa-200606-06.xml
+++ b/glsa-200606-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-06">
<title>AWStats: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
can lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>June 07, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-06-07</announced>
+ <revised>2009-05-28: 02</revised>
<bug>130487</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1945">CVE-2006-1945</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237">CVE-2006-2237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1945">CVE-2006-1945</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237">CVE-2006-2237</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 May 2006 08:51:28 +0000">
+ <metadata tag="requester" timestamp="2006-05-20T08:51:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 May 2006 19:06:44 +0000">
+ <metadata tag="submitter" timestamp="2006-05-21T19:06:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:28Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-07.xml b/glsa-200606-07.xml
index ec106f47..885de7a2 100644
--- a/glsa-200606-07.xml
+++ b/glsa-200606-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-07">
<title>Vixie Cron: Privilege Escalation</title>
<synopsis>
Vixie Cron allows local users to execute programs as root.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>June 09, 2006</announced>
- <revised>June 09, 2006: 01</revised>
+ <announced>2006-06-09</announced>
+ <revised>2006-06-09: 01</revised>
<bug>134194</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/vixie-cron-4.1-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/vixie-cron-4.1-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607">CVE-2006-2607</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607">CVE-2006-2607</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jun 2006 19:26:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-07T19:26:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 20:17:38 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T20:17:38Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 09 Jun 2006 03:56:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-09T03:56:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-08.xml b/glsa-200606-08.xml
index c7e60797..250245f3 100644
--- a/glsa-200606-08.xml
+++ b/glsa-200606-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-08">
<title>WordPress: Arbitrary command execution</title>
<synopsis>
WordPress fails to sufficiently check the format of cached username data.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>June 09, 2006</announced>
- <revised>June 10, 2006: 02</revised>
+ <announced>2006-06-09</announced>
+ <revised>2006-06-10: 02</revised>
<bug>134397</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667">CVE-2006-2667</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702">CVE-2006-2702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667">CVE-2006-2667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702">CVE-2006-2702</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 06 Jun 2006 16:40:51 +0000">
+ <metadata tag="submitter" timestamp="2006-06-06T16:40:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 Jun 2006 17:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-06T17:50:23Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-09.xml b/glsa-200606-09.xml
index 88d5e660..6cbf4d0e 100644
--- a/glsa-200606-09.xml
+++ b/glsa-200606-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-09">
<title>SpamAssassin: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to execute arbitrary commands, possibly as the root user.
</synopsis>
<product type="ebuild">Spamassassin</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>135746</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447">CVE-2006-2447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447">CVE-2006-2447</uri>
</references>
- <metadata tag="bugReady" timestamp="Thu, 08 Jun 2006 05:47:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-08T05:47:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Jun 2006 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2006-06-08T10:26:06Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-10.xml b/glsa-200606-10.xml
index a0da0eb3..d6a6e7f3 100644
--- a/glsa-200606-10.xml
+++ b/glsa-200606-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-10">
<title>Cscope: Many buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Cscope</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>133829</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5-r6"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541">CVE-2004-2541</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541">CVE-2004-2541</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:07:22 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:07:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:21:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:21:43Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Jun 2006 18:50:34 +0000">
+ <metadata tag="submitter" timestamp="2006-06-05T18:50:34Z">
dizzutch
</metadata>
</glsa>
diff --git a/glsa-200606-11.xml b/glsa-200606-11.xml
index a9a2921f..88ec11bb 100644
--- a/glsa-200606-11.xml
+++ b/glsa-200606-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-11">
<title>JPEG library: Denial of Service</title>
<synopsis>
The JPEG library is vulnerable to a Denial of Service.
</synopsis>
<product type="ebuild">jpeg</product>
- <announced>June 11, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-07-29: 02</revised>
<bug>130889</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/jpeg-6b-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/jpeg-6b-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3005">CVE-2006-3005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3005">CVE-2006-3005</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Jun 2006 22:15:44 +0000">
+ <metadata tag="requester" timestamp="2006-06-05T22:15:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 22:17:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T22:17:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Jun 2006 08:58:39 +0000">
+ <metadata tag="submitter" timestamp="2006-06-06T08:58:39Z">
daxomatic
</metadata>
</glsa>
diff --git a/glsa-200606-12.xml b/glsa-200606-12.xml
index 43b3e1e0..5bf0648b 100644
--- a/glsa-200606-12.xml
+++ b/glsa-200606-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-12">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>135254</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.4"</code>
<p>
Note: There is no stable fixed version for the Alpha
architecture yet. Users of Mozilla Firefox on Alpha should consider
@@ -70,24 +69,24 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777">CVE-2006-2777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782">CVE-2006-2782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784">CVE-2006-2784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785">CVE-2006-2785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777">CVE-2006-2777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782">CVE-2006-2782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784">CVE-2006-2784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785">CVE-2006-2785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 17:33:16 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T17:33:16Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 08 Jun 2006 10:36:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-08T10:36:32Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-13.xml b/glsa-200606-13.xml
index 8ba2156f..24268e0e 100644
--- a/glsa-200606-13.xml
+++ b/glsa-200606-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-13">
<title>MySQL: SQL Injection</title>
<synopsis>
@@ -8,8 +7,8 @@
process.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>June 11, 2006</announced>
- <revised>December 13, 2006: 04</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-12-13: 04</revised>
<bug>135076</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.1.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.1.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753">CVE-2006-2753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753">CVE-2006-2753</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:09:29 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:09:29Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 19:55:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T19:55:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 09:13:55 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T09:13:55Z">
daxomatic
</metadata>
</glsa>
diff --git a/glsa-200606-14.xml b/glsa-200606-14.xml
index dbf89202..510a684c 100644
--- a/glsa-200606-14.xml
+++ b/glsa-200606-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-14">
<title>GDM: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">gdm</product>
- <announced>June 12, 2006</announced>
- <revised>June 19, 2006: 02</revised>
+ <announced>2006-06-12</announced>
+ <revised>2006-06-19: 02</revised>
<bug>135027</bug>
<access>local</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-base/gdm-2.8.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-base/gdm-2.8.0.8"</code>
</resolution>
<references>
- <uri link="http://bugzilla.gnome.org/show_bug.cgi?id=343476">Gnome Bugzilla entry</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452">CVE-2006-2452</uri>
+ <uri link="https://bugzilla.gnome.org/show_bug.cgi?id=343476">Gnome Bugzilla entry</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452">CVE-2006-2452</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:45:03 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:45:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Jun 2006 08:32:35 +0000">
+ <metadata tag="submitter" timestamp="2006-06-09T08:32:35Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jun 2006 04:30:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-12T04:30:05Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-15.xml b/glsa-200606-15.xml
index 79dba3e6..b6f8ed35 100644
--- a/glsa-200606-15.xml
+++ b/glsa-200606-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-15">
<title>Asterisk: IAX2 video frame buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 14, 2006</announced>
- <revised>June 14, 2006: 01</revised>
+ <announced>2006-06-14</announced>
+ <revised>2006-06-14: 01</revised>
<bug>135680</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.0.11_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.0.11_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2898">CVE-2006-2898</uri>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=547&amp;idxseccion=10">Corelabs Asterisk PBX truncated video frame vulnerability advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2898">CVE-2006-2898</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=547&amp;idxseccion=10">Corelabs Asterisk PBX truncated video frame vulnerability advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:46:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:46:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Jun 2006 08:21:48 +0000">
+ <metadata tag="submitter" timestamp="2006-06-09T08:21:48Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Jun 2006 09:36:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-14T09:36:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-16.xml b/glsa-200606-16.xml
index 10347515..889e470a 100644
--- a/glsa-200606-16.xml
+++ b/glsa-200606-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-16">
<title>DokuWiki: PHP code injection</title>
<synopsis>
@@ -8,8 +7,8 @@
PHP commands, even without proper authentication.
</synopsis>
<product type="ebuild">DokuWiki</product>
- <announced>June 14, 2006</announced>
- <revised>June 14, 2006: 01</revised>
+ <announced>2006-06-14</announced>
+ <revised>2006-06-14: 01</revised>
<bug>135623</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309-r1"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory_042006.119.html">Hardened-PHP advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878">CVE-2006-2878</uri>
+ <uri link="https://www.hardened-php.net/advisory_042006.119.html">Hardened-PHP advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878">CVE-2006-2878</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 22:03:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T22:03:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jun 2006 18:33:06 +0000">
+ <metadata tag="submitter" timestamp="2006-06-12T18:33:06Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jun 2006 21:28:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-13T21:28:32Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-17.xml b/glsa-200606-17.xml
index c4af6435..05211e04 100644
--- a/glsa-200606-17.xml
+++ b/glsa-200606-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-17">
<title>OpenLDAP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
could result in arbitrary code execution.
</synopsis>
<product type="ebuild">net-nds/openldap</product>
- <announced>June 15, 2006</announced>
- <revised>June 15, 2006: 01</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-06-15: 01</revised>
<bug>134010</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.22"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754">CVE-2006-2754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754">CVE-2006-2754</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:43:24 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:43:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jun 2006 20:44:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-11T20:44:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jun 2006 07:06:11 +0000">
+ <metadata tag="submitter" timestamp="2006-06-12T07:06:11Z">
SeJo
</metadata>
</glsa>
diff --git a/glsa-200606-18.xml b/glsa-200606-18.xml
index 43524c84..ed7974d5 100644
--- a/glsa-200606-18.xml
+++ b/glsa-200606-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-18">
<title>PAM-MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
impossible to log into a machine.
</synopsis>
<product type="ebuild">pam_mysql</product>
- <announced>June 15, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-07-29: 02</revised>
<bug>120842</bug>
<access>local</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_mysql-0.7_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_mysql-0.7_rc1"</code>
</resolution>
<references>
- <uri link="http://pam-mysql.sourceforge.net/News/">Official release information</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4713">CVE-2005-4713</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0056">CVE-2006-0056</uri>
+ <uri link="https://pam-mysql.sourceforge.net/News/">Official release information</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4713">CVE-2005-4713</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0056">CVE-2006-0056</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 20:13:52 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T20:13:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jun 2006 20:15:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-11T20:15:46Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jun 2006 04:26:43 +0000">
+ <metadata tag="submitter" timestamp="2006-06-13T04:26:43Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200606-19.xml b/glsa-200606-19.xml
index f16f72e7..e15d3dec 100644
--- a/glsa-200606-19.xml
+++ b/glsa-200606-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-19">
<title>Sendmail: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
crash.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>June 15, 2006</announced>
- <revised>June 15, 2006: 01</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-06-15: 01</revised>
<bug>135141</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/sendmail-8.13.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/sendmail-8.13.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173">CVE-2006-1173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173">CVE-2006-1173</uri>
<uri link="http://www.sendmail.org/releases/8.13.7.html">Sendmail 8.13.7 release information</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Jun 2006 18:47:59 +0000">
+ <metadata tag="requester" timestamp="2006-06-14T18:47:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Jun 2006 19:21:03 +0000">
+ <metadata tag="submitter" timestamp="2006-06-14T19:21:03Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Jun 2006 16:00:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-15T16:00:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-20.xml b/glsa-200606-20.xml
index 106e157a..a86fd850 100644
--- a/glsa-200606-20.xml
+++ b/glsa-200606-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-20">
<title>Typespeed: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">typespeed</product>
- <announced>June 19, 2006</announced>
- <revised>June 19, 2006: 01</revised>
+ <announced>2006-06-19</announced>
+ <revised>2006-06-19: 01</revised>
<bug>135071</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-misc/typespeed-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-misc/typespeed-0.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1515">CVE-2006-1515</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1515">CVE-2006-1515</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 22:01:54 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T22:01:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jun 2006 05:10:07 +0000">
+ <metadata tag="submitter" timestamp="2006-06-13T05:10:07Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 12:23:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T12:23:54Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-21.xml b/glsa-200606-21.xml
index d517b9d0..1282924d 100644
--- a/glsa-200606-21.xml
+++ b/glsa-200606-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-21">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
JavaScript privilege escalation and possibly execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>June 19, 2006</announced>
- <revised>June 19, 2006: 01</revised>
+ <announced>2006-06-19</announced>
+ <revised>2006-06-19: 01</revised>
<bug>135256</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.4"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.4"</code>
<p>
Note: There is no stable fixed version for the Alpha architecture yet.
Users of Mozilla Thunderbird on Alpha should consider unmerging it
@@ -68,21 +67,21 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781">CVE-2006-2781</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781">CVE-2006-2781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 17:49:37 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T17:49:37Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 10:01:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T10:01:22Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-22.xml b/glsa-200606-22.xml
index fea23a77..153742e9 100644
--- a/glsa-200606-22.xml
+++ b/glsa-200606-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-22">
<title>aRts: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with elevated privileges.
</synopsis>
<product type="ebuild">aRts</product>
- <announced>June 22, 2006</announced>
- <revised>June 22, 2006: 01</revised>
+ <announced>2006-06-22</announced>
+ <revised>2006-06-22: 01</revised>
<bug>135970</bug>
<access>local</access>
<affected>
@@ -53,12 +52,12 @@
# emerge --ask --oneshot --verbose kde-base/arts</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Jun 2006 13:39:42 +0000">
+ <metadata tag="submitter" timestamp="2006-06-15T13:39:42Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Jun 2006 13:17:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-17T13:17:47Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-23.xml b/glsa-200606-23.xml
index d1d0df32..d56bca98 100644
--- a/glsa-200606-23.xml
+++ b/glsa-200606-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-23">
<title>KDM: Symlink vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">kdebase, KDM</product>
- <announced>June 22, 2006</announced>
- <revised>June 24, 2006: 02</revised>
+ <announced>2006-06-22</announced>
+ <revised>2006-06-24: 02</revised>
<bug>136201</bug>
<access>local</access>
<affected>
@@ -66,13 +65,13 @@
# emerge --ask --oneshot --verbose kde-base/kdm</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20060614-1.txt">KDE Security Advisory: KDM symlink attack vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449">CVE-2006-2449</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060614-1.txt">KDE Security Advisory: KDM symlink attack vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449">CVE-2006-2449</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 Jun 2006 19:50:34 +0000">
+ <metadata tag="submitter" timestamp="2006-06-14T19:50:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 09:50:44 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T09:50:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200606-24.xml b/glsa-200606-24.xml
index fb1eab0a..8f198c05 100644
--- a/glsa-200606-24.xml
+++ b/glsa-200606-24.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-24">
<title>wv2: Integer overflow</title>
<synopsis>
An integer overflow could allow an attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">wv2</product>
- <announced>June 23, 2006</announced>
- <revised>June 23, 2006: 01</revised>
+ <announced>2006-06-23</announced>
+ <revised>2006-06-23: 01</revised>
<bug>136759</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/wv2-0.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/wv2-0.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2197">CVE 2006-2197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2197">CVE 2006-2197</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Jun 2006 15:46:28 +0000">
+ <metadata tag="requester" timestamp="2006-06-21T15:46:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Jun 2006 17:08:02 +0000">
+ <metadata tag="submitter" timestamp="2006-06-21T17:08:02Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Jun 2006 18:19:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-21T18:19:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200606-25.xml b/glsa-200606-25.xml
index e2cde251..31d60fbd 100644
--- a/glsa-200606-25.xml
+++ b/glsa-200606-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-25">
<title>Hashcash: Possible heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">hashcash</product>
- <announced>June 26, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-26</announced>
+ <revised>2006-07-29: 02</revised>
<bug>134960</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hashcash-1.21"</code>
</resolution>
<references>
<uri link="http://www.hashcash.org/source/CHANGELOG">Hashcash ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Jun 2006 12:26:10 +0000">
+ <metadata tag="requester" timestamp="2006-06-18T12:26:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Jun 2006 12:57:56 +0000">
+ <metadata tag="submitter" timestamp="2006-06-18T12:57:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:48:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:48:20Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-26.xml b/glsa-200606-26.xml
index 1c9bfd79..412cb666 100644
--- a/glsa-200606-26.xml
+++ b/glsa-200606-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-26">
<title>EnergyMech: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
easily exploitable via IRC.
</synopsis>
<product type="ebuild">emech</product>
- <announced>June 26, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-26</announced>
+ <revised>2006-07-29: 02</revised>
<bug>132749</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/emech-3.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/emech-3.0.2"</code>
</resolution>
<references>
<uri link="http://www.energymech.net/versions-3.0.html">EnergyMech Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3293">CVE-2006-3293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3293">CVE-2006-3293</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Jun 2006 18:15:43 +0000">
+ <metadata tag="requester" timestamp="2006-06-22T18:15:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 23:37:12 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T23:37:12Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:56:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:56:34Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-27.xml b/glsa-200606-27.xml
index 93416eca..8f3d2737 100644
--- a/glsa-200606-27.xml
+++ b/glsa-200606-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-27">
<title>Mutt: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>June 28, 2006</announced>
- <revised>June 28, 2006: 01</revised>
+ <announced>2006-06-28</announced>
+ <revised>2006-06-28: 01</revised>
<bug>138125</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mutt-1.5.11-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mutt-1.5.11-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242">CVE-2006-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242">CVE-2006-3242</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Jun 2006 19:49:38 +0000">
+ <metadata tag="requester" timestamp="2006-06-27T19:49:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Jun 2006 20:02:54 +0000">
+ <metadata tag="submitter" timestamp="2006-06-27T20:02:54Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 28 Jun 2006 10:14:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-28T10:14:15Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-28.xml b/glsa-200606-28.xml
index b55ba570..529bef06 100644
--- a/glsa-200606-28.xml
+++ b/glsa-200606-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-28">
<title>Horde Web Application Framework: XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">horde</product>
- <announced>June 29, 2006</announced>
- <revised>June 29, 2006: 01</revised>
+ <announced>2006-06-29</announced>
+ <revised>2006-06-29: 01</revised>
<bug>136830</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2195">CVE-2006-2195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2195">CVE-2006-2195</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 14:59:32 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T14:59:32Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:49:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:49:08Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200606-29.xml b/glsa-200606-29.xml
index a8773305..745a7b68 100644
--- a/glsa-200606-29.xml
+++ b/glsa-200606-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-29">
<title>Tikiwiki: SQL injection and multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>June 29, 2006</announced>
- <revised>June 29, 2006: 01</revised>
+ <announced>2006-06-29</announced>
+ <revised>2006-06-29: 01</revised>
<bug>136723</bug>
<bug>134483</bug>
<access>remote</access>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3048">CVE-2006-3048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3047">CVE-2006-3047</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3048">CVE-2006-3048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3047">CVE-2006-3047</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 26 Jun 2006 00:18:20 +0000">
+ <metadata tag="submitter" timestamp="2006-06-26T00:18:20Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Jun 2006 20:19:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-26T20:19:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200606-30.xml b/glsa-200606-30.xml
index cea0726d..ec195a1f 100644
--- a/glsa-200606-30.xml
+++ b/glsa-200606-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-30">
<title>Kiax: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code by a remote attacker.
</synopsis>
<product type="ebuild">kiax</product>
- <announced>June 30, 2006</announced>
- <revised>June 30, 2006: 01</revised>
+ <announced>2006-06-30</announced>
+ <revised>2006-06-30: 01</revised>
<bug>136099</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/kiax-0.8.5_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/kiax-0.8.5_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923">CVE-2006-2923</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923">CVE-2006-2923</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Jun 2006 11:02:44 +0000">
+ <metadata tag="requester" timestamp="2006-06-22T11:02:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 Jun 2006 11:16:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-22T11:16:37Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 15:23:48 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T15:23:48Z">
dizzutch
</metadata>
</glsa>
diff --git a/glsa-200607-01.xml b/glsa-200607-01.xml
index a2e99046..eb804a0c 100644
--- a/glsa-200607-01.xml
+++ b/glsa-200607-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-01">
<title>mpg123: Heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>July 03, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-07-03</announced>
+ <revised>2006-07-29: 02</revised>
<bug>133988</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3355">CVE-2006-3355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3355">CVE-2006-3355</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Jun 2006 16:01:33 +0000">
+ <metadata tag="requester" timestamp="2006-06-30T16:01:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Jun 2006 18:10:59 +0000">
+ <metadata tag="submitter" timestamp="2006-06-30T18:10:59Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Jul 2006 14:50:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-02T14:50:47Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-02.xml b/glsa-200607-02.xml
index 52bfc6c3..fd7d3e74 100644
--- a/glsa-200607-02.xml
+++ b/glsa-200607-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-02">
<title>FreeType: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
FreeType, resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>July 09, 2006</announced>
- <revised>September 03, 2006: 02</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-09-03: 02</revised>
<bug>124828</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.1.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.1.10-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Jul 2006 13:58:56 +0000">
+ <metadata tag="requester" timestamp="2006-07-04T13:58:56Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jul 2006 15:44:57 +0000">
+ <metadata tag="submitter" timestamp="2006-07-04T15:44:57Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Jul 2006 16:43:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-05T16:43:48Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200607-03.xml b/glsa-200607-03.xml
index 5dd5d186..42737682 100644
--- a/glsa-200607-03.xml
+++ b/glsa-200607-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-03">
<title>libTIFF: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>July 09, 2006</announced>
- <revised>July 09, 2006: 01</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-07-09: 01</revised>
<bug>135881</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193">CVE-2006-2193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656">CVE-2006-2656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193">CVE-2006-2193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656">CVE-2006-2656</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 05 Jul 2006 16:38:15 +0000">
+ <metadata tag="submitter" timestamp="2006-07-05T16:38:15Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Jul 2006 16:38:38 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-05T16:38:38Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200607-04.xml b/glsa-200607-04.xml
index fb9c91f8..057de87b 100644
--- a/glsa-200607-04.xml
+++ b/glsa-200607-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-04">
<title>PostgreSQL: SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL statements.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>July 09, 2006</announced>
- <revised>June 26, 2007: 03</revised>
+ <announced>2006-07-09</announced>
+ <revised>2007-06-26: 03</revised>
<bug>134168</bug>
<access>remote</access>
<affected>
@@ -61,17 +60,17 @@
</p>
</resolution>
<references>
- <uri link="http://www.postgresql.org/docs/techdocs.50">PostgreSQL technical information</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</uri>
+ <uri link="https://www.postgresql.org/docs/techdocs.50">PostgreSQL technical information</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:08:33 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:08:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 19:43:38 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T19:43:38Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Jul 2006 16:30:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-09T16:30:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200607-05.xml b/glsa-200607-05.xml
index 20681066..10f3baef 100644
--- a/glsa-200607-05.xml
+++ b/glsa-200607-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-05">
<title>SHOUTcast server: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
multiple XSS vulnerabilities.
</synopsis>
<product type="ebuild">shoutcast</product>
- <announced>July 09, 2006</announced>
- <revised>July 29, 2006: 03</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-07-29: 03</revised>
<bug>136721</bug>
<bug>136221</bug>
<access>remote</access>
@@ -52,22 +51,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/shoutcast-server-bin-1.9.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/shoutcast-server-bin-1.9.7"</code>
</resolution>
<references>
<uri link="http://people.ksp.sk/~goober/advisory/001-shoutcast.html">Original advisory</uri>
- <uri link="http://secunia.com/advisories/20524/">SA20524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3007">CVE-2006-3007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3534">CVE-2006-3534</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3535">CVE-2006-3535</uri>
+ <uri link="https://secunia.com/advisories/20524/">SA20524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3007">CVE-2006-3007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3534">CVE-2006-3534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3535">CVE-2006-3535</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Jun 2006 16:19:23 +0000">
+ <metadata tag="requester" timestamp="2006-06-30T16:19:23Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Jun 2006 17:31:32 +0000">
+ <metadata tag="submitter" timestamp="2006-06-30T17:31:32Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Jul 2006 14:51:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-02T14:51:02Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-06.xml b/glsa-200607-06.xml
index 6db1c761..81f482aa 100644
--- a/glsa-200607-06.xml
+++ b/glsa-200607-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-06">
<title>libpng: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>July 19, 2006</announced>
- <revised>July 19, 2006: 01</revised>
+ <announced>2006-07-19</announced>
+ <revised>2006-07-19: 01</revised>
<bug>138433</bug>
<bug>138672</bug>
<access>remote</access>
@@ -55,26 +54,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.12"</code>
<p>
All AMD64 emul-linux-x86-baselibs users should also upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.1"</code>
</resolution>
<references>
- <uri link="http://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt">libpng Changelog</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
+ <uri link="https://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt">libpng Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Jul 2006 14:10:20 +0000">
+ <metadata tag="requester" timestamp="2006-07-04T14:10:20Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jul 2006 18:53:23 +0000">
+ <metadata tag="submitter" timestamp="2006-07-04T18:53:23Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:54:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:54:49Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-07.xml b/glsa-200607-07.xml
index 5a394049..0ec8207f 100644
--- a/glsa-200607-07.xml
+++ b/glsa-200607-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-07">
<title>xine-lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
xine-lib, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>July 20, 2006</announced>
- <revised>July 20, 2006: 01</revised>
+ <announced>2006-07-20</announced>
+ <revised>2006-07-20: 01</revised>
<bug>139319</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200">CVE-2006-2200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200">CVE-2006-2200</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:17:02 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:17:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jul 2006 20:18:19 +0000">
+ <metadata tag="submitter" timestamp="2006-07-12T20:18:19Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:55:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:55:34Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-08.xml b/glsa-200607-08.xml
index ed8a0874..03bd6855 100644
--- a/glsa-200607-08.xml
+++ b/glsa-200607-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-08">
<title>GIMP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when loading specially crafted XCF files.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>July 23, 2006</announced>
- <revised>July 24, 2006: 02</revised>
+ <announced>2006-07-23</announced>
+ <revised>2006-07-24: 02</revised>
<bug>139524</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404">CVE-2006-3404</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404">CVE-2006-3404</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:07:39 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:07:39Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Jul 2006 18:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-12T18:38:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jul 2006 19:27:03 +0000">
+ <metadata tag="submitter" timestamp="2006-07-12T19:27:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200607-09.xml b/glsa-200607-09.xml
index 93b19921..3f88d98e 100644
--- a/glsa-200607-09.xml
+++ b/glsa-200607-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-09">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacker.
</synopsis>
<product type="ebuild">wireshark ethereal</product>
- <announced>July 25, 2006</announced>
- <revised>July 25, 2006: 01</revised>
+ <announced>2006-07-25</announced>
+ <revised>2006-07-25: 01</revised>
<bug>140856</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.2"</code>
<p>
All Ethereal users should migrate to Wireshark:
</p>
<code>
# emerge --sync
# emerge --ask --unmerge net-analyzer/ethereal
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.2"</code>
<p>
To keep the [saved] configuration from Ethereal and reuse it with
Wireshark:
@@ -69,21 +68,21 @@
# mv ~/.ethereal ~/.wireshark</code>
</resolution>
<references>
- <uri link="http://www.wireshark.org/security/wnpa-sec-2006-01.html">Wireshark wnpa-sec-2006-01</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627">CVE-2006-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628">CVE-2006-3628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629">CVE-2006-3629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630">CVE-2006-3630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631">CVE-2006-3631</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632">CVE-2006-3632</uri>
+ <uri link="https://www.wireshark.org/security/wnpa-sec-2006-01.html">Wireshark wnpa-sec-2006-01</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627">CVE-2006-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628">CVE-2006-3628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629">CVE-2006-3629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630">CVE-2006-3630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631">CVE-2006-3631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632">CVE-2006-3632</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jul 2006 16:53:04 +0000">
+ <metadata tag="requester" timestamp="2006-07-19T16:53:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 19 Jul 2006 18:04:14 +0000">
+ <metadata tag="submitter" timestamp="2006-07-19T18:04:14Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Jul 2006 20:10:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-22T20:10:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200607-10.xml b/glsa-200607-10.xml
index 8bf0b5af..9c16decd 100644
--- a/glsa-200607-10.xml
+++ b/glsa-200607-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-10">
<title>Samba: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
within Samba.
</synopsis>
<product type="ebuild">samba</product>
- <announced>July 25, 2006</announced>
- <revised>July 25, 2006: 01</revised>
+ <announced>2006-07-25</announced>
+ <revised>2006-07-25: 01</revised>
<bug>139369</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.22-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.22-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Jul 2006 19:09:42 +0000">
+ <metadata tag="requester" timestamp="2006-07-23T19:09:42Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Jul 2006 19:57:17 +0000">
+ <metadata tag="submitter" timestamp="2006-07-23T19:57:17Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jul 2006 19:57:30 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-23T19:57:30Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200607-11.xml b/glsa-200607-11.xml
index 489e3f30..f50ea62d 100644
--- a/glsa-200607-11.xml
+++ b/glsa-200607-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-11">
<title>TunePimp: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Tunepimp</product>
- <announced>July 28, 2006</announced>
- <revised>June 01, 2007: 02</revised>
+ <announced>2006-07-28</announced>
+ <revised>2007-06-01: 02</revised>
<bug>140184</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tunepimp-0.5.&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tunepimp-0.5."</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3600">CVE-2006-3600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3600">CVE-2006-3600</uri>
<uri link="http://bugs.musicbrainz.org/ticket/1764">MusicBrainz bug #1764</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Jul 2006 17:18:27 +0000">
+ <metadata tag="submitter" timestamp="2006-07-25T17:18:27Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Jul 2006 17:51:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-27T17:51:46Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-12.xml b/glsa-200607-12.xml
index 407f5074..02c9a7c7 100644
--- a/glsa-200607-12.xml
+++ b/glsa-200607-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-12">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited to allow the execution of arbitrary code by a remote attacker.
</synopsis>
<product type="ebuild">OpenOffice.org</product>
- <announced>July 28, 2006</announced>
- <revised>July 28, 2006: 01</revised>
+ <announced>2006-07-28</announced>
+ <revised>2006-07-28: 01</revised>
<bug>138545</bug>
<access>remote</access>
<affected>
@@ -64,18 +63,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.3"</code>
</resolution>
<references>
- <uri link="http://www.openoffice.org/security/bulletin-20060629.html">OpenOffice.org Security Bulletin 2006-06-29</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199">CVE-2006-2199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198">CVE-2006-2198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117">CVE-2006-3117</uri>
+ <uri link="https://www.openoffice.org/security/bulletin-20060629.html">OpenOffice.org Security Bulletin 2006-06-29</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199">CVE-2006-2199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198">CVE-2006-2198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117">CVE-2006-3117</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 19 Jul 2006 12:40:14 +0000">
+ <metadata tag="submitter" timestamp="2006-07-19T12:40:14Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jul 2006 16:32:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-20T16:32:57Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200607-13.xml b/glsa-200607-13.xml
index ca6c6dde..df53c617 100644
--- a/glsa-200607-13.xml
+++ b/glsa-200607-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-13">
<title>Audacious: Multiple heap and buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
that could result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">audacious</product>
- <announced>July 29, 2006</announced>
- <revised>July 29, 2006: 01</revised>
+ <announced>2006-07-29</announced>
+ <revised>2006-07-29: 01</revised>
<bug>139957</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacious-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacious-1.1.0"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/439432/30/0/threaded">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:07:27 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:07:27Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 16 Jul 2006 10:46:17 +0000">
+ <metadata tag="submitter" timestamp="2006-07-16T10:46:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:55:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:55:12Z">
koon
</metadata>
</glsa>
diff --git a/glsa-200608-01.xml b/glsa-200608-01.xml
index 171f078a..2dc16c92 100644
--- a/glsa-200608-01.xml
+++ b/glsa-200608-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-01">
<title>Apache: Off-by-one flaw in mod_rewrite</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">apache</product>
- <announced>August 01, 2006</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2006-08-01</announced>
+ <revised>2007-12-30: 02</revised>
<bug>141986</bug>
<access>remote</access>
<affected>
@@ -55,17 +54,17 @@
# emerge --ask --oneshot --verbose www-servers/apache</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">CVE-2006-3747</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement2.0.html">Apache HTTP Server 2.0 Announcement</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement1.3.html">Apache HTTP Server 1.3 Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">CVE-2006-3747</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement2.0.html">Apache HTTP Server 2.0 Announcement</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement1.3.html">Apache HTTP Server 1.3 Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 11:10:33 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T11:10:33Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 12:10:22 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T12:10:22Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 21:48:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-29T21:48:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200608-02.xml b/glsa-200608-02.xml
index 41fe3ae0..26988766 100644
--- a/glsa-200608-02.xml
+++ b/glsa-200608-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-02">
<title>Mozilla SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla SeaMonkey.
</synopsis>
<product type="ebuild">SeaMonkey</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -99,31 +98,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 14:37:24 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T14:37:24Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:00:11 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:00:11Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:55:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:55:20Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200608-03.xml b/glsa-200608-03.xml
index b551ff20..2269e2a5 100644
--- a/glsa-200608-03.xml
+++ b/glsa-200608-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-03">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Firefox.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -101,33 +100,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.5"</code>
<p>
Users of the binary package should upgrade as well:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:10:10 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:10:10Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:55:03 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:55:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200608-04.xml b/glsa-200608-04.xml
index 0e405f7d..0ff603d7 100644
--- a/glsa-200608-04.xml
+++ b/glsa-200608-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-04">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Thunderbird.
</synopsis>
<product type="ebuild">Thunderbird</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -92,35 +91,35 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.5"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 14:37:07 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T14:37:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:08:55 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:08:55Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:54:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:54:43Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200608-05.xml b/glsa-200608-05.xml
index 1f4a8436..1330cc4a 100644
--- a/glsa-200608-05.xml
+++ b/glsa-200608-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-05">
<title>LibVNCServer: Authentication bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
server.
</synopsis>
<product type="ebuild">libvncserver</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>136916</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/libvncserver-0.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/libvncserver-0.8.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jul 2006 16:47:24 +0000">
+ <metadata tag="requester" timestamp="2006-07-29T16:47:24Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 16:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-29T16:50:23Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Jul 2006 01:51:07 +0000">
+ <metadata tag="submitter" timestamp="2006-07-31T01:51:07Z">
hlieberman
</metadata>
</glsa>
diff --git a/glsa-200608-06.xml b/glsa-200608-06.xml
index 51f1c4e9..7f2d9fea 100644
--- a/glsa-200608-06.xml
+++ b/glsa-200608-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-06">
<title>Courier MTA: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
character.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>135005</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/courier-0.53.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/courier-0.53.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2659">CVE-2006-2659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2659">CVE-2006-2659</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Aug 2006 13:22:29 +0000">
+ <metadata tag="requester" timestamp="2006-08-02T13:22:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Aug 2006 13:22:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-02T13:22:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Aug 2006 13:39:08 +0000">
+ <metadata tag="submitter" timestamp="2006-08-02T13:39:08Z">
dizzutch
</metadata>
</glsa>
diff --git a/glsa-200608-07.xml b/glsa-200608-07.xml
index 0662daaa..3659b256 100644
--- a/glsa-200608-07.xml
+++ b/glsa-200608-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-07">
<title>libTIFF: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>142383</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459">CVE-2006-3459</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460">CVE-2006-3460</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461">CVE-2006-3461</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462">CVE-2006-3462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463">CVE-2006-3463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464">CVE-2006-3464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465">CVE-2006-3465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459">CVE-2006-3459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460">CVE-2006-3460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461">CVE-2006-3461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462">CVE-2006-3462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463">CVE-2006-3463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464">CVE-2006-3464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465">CVE-2006-3465</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 03 Aug 2006 11:25:07 +0000">
+ <metadata tag="submitter" timestamp="2006-08-03T11:25:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Aug 2006 09:34:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-04T09:34:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200608-08.xml b/glsa-200608-08.xml
index 03090349..ae93f5a4 100644
--- a/glsa-200608-08.xml
+++ b/glsa-200608-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-08">
<title>GnuPG: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>August 05, 2006</announced>
- <revised>August 08, 2006: 02</revised>
+ <announced>2006-08-05</announced>
+ <revised>2006-08-08: 02</revised>
<bug>142248</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=app-crypt/gnupg-1.4*&quot;</code>
+ # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746">CVE-2006-3746</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746">CVE-2006-3746</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Aug 2006 13:24:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-02T13:24:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Aug 2006 13:48:08 +0000">
+ <metadata tag="submitter" timestamp="2006-08-02T13:48:08Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 11:09:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T11:09:20Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200608-09.xml b/glsa-200608-09.xml
index 753f5277..c4dcd6c4 100644
--- a/glsa-200608-09.xml
+++ b/glsa-200608-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-09">
<title>MySQL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
date_format function.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 06, 2006</announced>
- <revised>August 07, 2006: 02</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-08-07: 02</revised>
<bug>142429</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=dev-db/mysql-4.1.21&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=dev-db/mysql-4.1.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3469">CVE-2006-3469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3469">CVE-2006-3469</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Aug 2006 17:22:07 +0000">
+ <metadata tag="requester" timestamp="2006-08-06T17:22:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Aug 2006 17:22:38 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-06T17:22:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Aug 2006 18:32:52 +0000">
+ <metadata tag="submitter" timestamp="2006-08-06T18:32:52Z">
hlieberman
</metadata>
</glsa>
diff --git a/glsa-200608-10.xml b/glsa-200608-10.xml
index d766b2a3..9def5bac 100644
--- a/glsa-200608-10.xml
+++ b/glsa-200608-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-10">
<title>pike: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
statements in the underlying PostgreSQL database.
</synopsis>
<product type="ebuild">pike</product>
- <announced>August 06, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-12-13: 02</revised>
<bug>136065</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/pike-7.6.86&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/pike-7.6.86"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/20494/">Secunia Advisory SA20494</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4041">CVE-2006-4041</uri>
+ <uri link="https://secunia.com/advisories/20494/">Secunia Advisory SA20494</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4041">CVE-2006-4041</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 16:54:41 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T16:54:41Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 16:55:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T16:55:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:42:54 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:42:54Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-11.xml b/glsa-200608-11.xml
index 45cb3d2d..54d14393 100644
--- a/glsa-200608-11.xml
+++ b/glsa-200608-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-11">
<title>Webmin, Usermin: File Disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
specially crafted URL.
</synopsis>
<product type="ebuild">webmin/usermin</product>
- <announced>August 06, 2006</announced>
- <revised>August 06, 2006: 01</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-08-06: 01</revised>
<bug>138552</bug>
<access>remote</access>
<affected>
@@ -53,23 +52,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/webmin-1.290&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/webmin-1.290"</code>
<p>
All Usermin users should update to the latest stable version:
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/usermin-1.220&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/usermin-1.220"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3392">CVE-2006-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3392">CVE-2006-3392</uri>
</references>
<metadata tag="">
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Aug 2006 17:23:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-06T17:23:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Aug 2006 18:24:45 +0000">
+ <metadata tag="submitter" timestamp="2006-08-06T18:24:45Z">
hlieberman
</metadata>
</glsa>
diff --git a/glsa-200608-12.xml b/glsa-200608-12.xml
index 22f8bb68..94059ca9 100644
--- a/glsa-200608-12.xml
+++ b/glsa-200608-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-12">
<title>x11vnc: Authentication bypass in included LibVNCServer code</title>
<synopsis>
@@ -9,8 +8,8 @@
access to the server.
</synopsis>
<product type="ebuild">x11vnc</product>
- <announced>August 07, 2006</announced>
- <revised>August 07, 2006: 01</revised>
+ <announced>2006-08-07</announced>
+ <revised>2006-08-07: 01</revised>
<bug>142559</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/x11vnc-0.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/x11vnc-0.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
- <uri link="/security/en/glsa/glsa-200608-05.xml">GLSA-200608-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-05.xml">GLSA-200608-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 07:18:47 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T07:18:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 16:44:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T16:44:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:17:11 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:17:11Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-13.xml b/glsa-200608-13.xml
index 1556aa68..b1907022 100644
--- a/glsa-200608-13.xml
+++ b/glsa-200608-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-13">
<title>ClamAV: Heap buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service and potentially remote execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 08, 2006</announced>
- <revised>August 08, 2006: 02</revised>
+ <announced>2006-08-08</announced>
+ <revised>2006-08-08: 02</revised>
<bug>143093</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.4"</code>
</resolution>
<references>
- <uri link="http://www.clamav.net/security/0.88.4.html">ClamAV security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4018">CVE-2006-4018</uri>
+ <uri link="https://www.clamav.net/security/0.88.4.html">ClamAV security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4018">CVE-2006-4018</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 08 Aug 2006 07:45:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-08T07:45:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 09:57:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T09:57:22Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200608-14.xml b/glsa-200608-14.xml
index 806ab3ef..5951151b 100644
--- a/glsa-200608-14.xml
+++ b/glsa-200608-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-14">
<title>DUMB: Heap buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">dumb</product>
- <announced>August 08, 2006</announced>
- <revised>August 08, 2006: 01</revised>
+ <announced>2006-08-08</announced>
+ <revised>2006-08-08: 01</revised>
<bug>142387</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/dumb-0.9.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/dumb-0.9.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3668">CVE-2006-3668</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3668">CVE-2006-3668</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 16:58:21 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T16:58:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:55:25 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:55:25Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 09:58:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T09:58:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200608-15.xml b/glsa-200608-15.xml
index b22e4129..fb37c135 100644
--- a/glsa-200608-15.xml
+++ b/glsa-200608-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-15">
<title>MIT Kerberos 5: Multiple local privilege escalation vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">MIT Kerberos 5</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>143240</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.4.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Aug 2006 18:31:59 +0000">
+ <metadata tag="requester" timestamp="2006-08-09T18:31:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Aug 2006 20:23:17 +0000">
+ <metadata tag="submitter" timestamp="2006-08-09T20:23:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Aug 2006 14:34:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-10T14:34:58Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-16.xml b/glsa-200608-16.xml
index c8b11f5a..9ea872dd 100644
--- a/glsa-200608-16.xml
+++ b/glsa-200608-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-16">
<title>Warzone 2100 Resurrection: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
buffer overflows, potentially allowing remote code execution.
</synopsis>
<product type="ebuild">warzone2100</product>
- <announced>August 10, 2006</announced>
- <revised>September 04, 2006: 02</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-09-04: 02</revised>
<bug>142389</bug>
<access>remote</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/warzone2100-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/warzone2100-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3849">CVE-2006-3849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3849">CVE-2006-3849</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 07:47:59 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T07:47:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Aug 2006 07:48:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-07T07:48:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:17:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:17:00Z">
dizzutch
</metadata>
</glsa>
diff --git a/glsa-200608-17.xml b/glsa-200608-17.xml
index ba5244f2..b3ae32b6 100644
--- a/glsa-200608-17.xml
+++ b/glsa-200608-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-17">
<title>libwmf: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libwmf</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>139325</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libwmf-0.2.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libwmf-0.2.8.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376">CVE-2006-3376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376">CVE-2006-3376</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 08:01:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T08:01:55Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:39:07 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:39:07Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 11:33:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T11:33:41Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-18.xml b/glsa-200608-18.xml
index 738c3ab7..8e2f5293 100644
--- a/glsa-200608-18.xml
+++ b/glsa-200608-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-18">
<title>Net::Server: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited to cause a Denial of Service.
</synopsis>
<product type="ebuild">net-server</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>142386</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/net-server-0.88&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/net-server-0.88"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1127">CVE-2005-1127</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1127">CVE-2005-1127</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 08:06:01 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T08:06:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:30:18 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:30:18Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 10:05:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T10:05:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200608-19.xml b/glsa-200608-19.xml
index 6bba0565..ed6af07e 100644
--- a/glsa-200608-19.xml
+++ b/glsa-200608-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-19">
<title>WordPress: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>August 10, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-12-13: 02</revised>
<bug>142142</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389">CVE-2006-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390">CVE-2006-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028">CVE-2006-4028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389">CVE-2006-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390">CVE-2006-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028">CVE-2006-4028</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 16:38:11 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T16:38:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Aug 2006 02:48:29 +0000">
+ <metadata tag="submitter" timestamp="2006-08-08T02:48:29Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 13:15:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T13:15:28Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200608-20.xml b/glsa-200608-20.xml
index 251733a2..33a92fa5 100644
--- a/glsa-200608-20.xml
+++ b/glsa-200608-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-20">
<title>Ruby on Rails: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and maybe the remote execution of arbitrary Ruby scripts.
</synopsis>
<product type="ebuild">rails</product>
- <announced>August 14, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-14</announced>
+ <revised>2006-12-13: 02</revised>
<bug>143369</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-1.1.6"</code>
</resolution>
<references>
<uri link="http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits">Ruby on Rails original advisory (1.1.5)</uri>
<uri link="http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure">Ruby on Rails update (1.1.6)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4111">CVE-2006-4111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4112">CVE-2006-4112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4111">CVE-2006-4111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4112">CVE-2006-4112</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Aug 2006 07:34:02 +0000">
+ <metadata tag="requester" timestamp="2006-08-10T07:34:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Aug 2006 14:54:45 +0000">
+ <metadata tag="submitter" timestamp="2006-08-10T14:54:45Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Aug 2006 21:05:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-10T21:05:59Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-21.xml b/glsa-200608-21.xml
index 3f2016b0..f3c87d99 100644
--- a/glsa-200608-21.xml
+++ b/glsa-200608-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-21">
<title>Heimdal: Multiple local privilege escalation vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>August 23, 2006</announced>
- <revised>August 23, 2006: 01</revised>
+ <announced>2006-08-23</announced>
+ <revised>2006-08-23: 01</revised>
<bug>143371</bug>
<access>local</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.7.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.7.2-r3"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2006-08-08/">Official advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2006-08-08/">Official advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Aug 2006 15:34:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-12T15:34:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Aug 2006 22:34:21 +0000">
+ <metadata tag="submitter" timestamp="2006-08-13T22:34:21Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Aug 2006 15:19:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-14T15:19:23Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-22.xml b/glsa-200608-22.xml
index 01edfe6e..2f9b5885 100644
--- a/glsa-200608-22.xml
+++ b/glsa-200608-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-22">
<title>fbida: Arbitrary command execution</title>
<synopsis>
The fbgs script provided by fbida allows the execution of arbitrary code.
</synopsis>
<product type="ebuild">fbida</product>
- <announced>August 23, 2006</announced>
- <revised>August 23, 2006: 01</revised>
+ <announced>2006-08-23</announced>
+ <revised>2006-08-23: 01</revised>
<bug>141684</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/fbida-2.03-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/fbida-2.03-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3119">CVE-2006-3119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3119">CVE-2006-3119</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Aug 2006 16:25:22 +0000">
+ <metadata tag="requester" timestamp="2006-08-19T16:25:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 14:00:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T14:00:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 14:19:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T14:19:22Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-23.xml b/glsa-200608-23.xml
index 5e60c738..831691e9 100644
--- a/glsa-200608-23.xml
+++ b/glsa-200608-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-23">
<title>Heartbeat: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker without authentication.
</synopsis>
<product type="ebuild">heartbeat</product>
- <announced>August 24, 2006</announced>
- <revised>September 22, 2006: 02</revised>
+ <announced>2006-08-24</announced>
+ <revised>2006-09-22: 02</revised>
<bug>141894</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
# emerge --ask --oneshot --verbose sys-cluster/heartbeat</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121">CVE-2006-3121</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815">CVE-2006-3815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121">CVE-2006-3121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815">CVE-2006-3815</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Aug 2006 16:22:39 +0000">
+ <metadata tag="requester" timestamp="2006-08-19T16:22:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 14:22:38 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T14:22:38Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 14:19:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T14:19:23Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-24.xml b/glsa-200608-24.xml
index a3dbc403..cb2edc92 100644
--- a/glsa-200608-24.xml
+++ b/glsa-200608-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-24">
<title>AlsaPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">AlsaPlayer</product>
- <announced>August 26, 2006</announced>
- <revised>August 26, 2006: 01</revised>
+ <announced>2006-08-26</announced>
+ <revised>2006-08-26: 01</revised>
<bug>143402</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
further notice:
</p>
<code>
- # emerge --ask --unmerge &quot;media-sound/alsaplayer&quot;</code>
+ # emerge --ask --unmerge "media-sound/alsaplayer"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4089">CVE-2006-4089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4089">CVE-2006-4089</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Aug 2006 15:04:43 +0000">
+ <metadata tag="requester" timestamp="2006-08-18T15:04:43Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Aug 2006 21:34:55 +0000">
+ <metadata tag="submitter" timestamp="2006-08-18T21:34:55Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Aug 2006 21:40:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-18T21:40:51Z">
hlieberman
</metadata>
</glsa>
diff --git a/glsa-200608-25.xml b/glsa-200608-25.xml
index d8d30463..e6f55b02 100644
--- a/glsa-200608-25.xml
+++ b/glsa-200608-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-25">
<title>X.org and some X.org libraries: Local privilege escalations</title>
<synopsis>
@@ -8,8 +7,8 @@
to local privilege escalations because of unchecked setuid() calls.
</synopsis>
<product type="ebuild">xorg-x11,xorg-server,xtrans,xload,xinit,xterm,xf86dga,xdm,libX11</product>
- <announced>August 28, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-28</announced>
+ <revised>2006-12-13: 02</revised>
<bug>135974</bug>
<access>local</access>
<affected>
@@ -85,62 +84,62 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xdm-1.0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xdm-1.0.4-r1"</code>
<p>
All X.Org xinit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xinit-1.0.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xinit-1.0.2-r6"</code>
<p>
All X.Org xload users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xload-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xload-1.0.1-r1"</code>
<p>
All X.Org xf86dga users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xf86dga-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xf86dga-1.0.1-r1"</code>
<p>
All X.Org users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.9.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.9.0-r2"</code>
<p>
All X.Org X servers users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.1.0-r1"</code>
<p>
All X.Org X11 library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libx11-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libx11-1.0.1-r1"</code>
<p>
All X.Org xtrans library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/xtrans-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/xtrans-1.0.1-r1"</code>
<p>
All xterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/xterm-215&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/xterm-215"</code>
<p>
All users of the X11R6 libraries for emulation of 32bit x86 on amd64
should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-xlibs-7.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-xlibs-7.0-r2"</code>
<p>
Please note that the fixed packages have been available for most
architectures since June 30th but the GLSA release was held up waiting
@@ -148,16 +147,16 @@
</p>
</resolution>
<references>
- <uri link="http://lists.freedesktop.org/archives/xorg/2006-June/016146.html">X.Org security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
+ <uri link="https://lists.freedesktop.org/archives/xorg/2006-June/016146.html">X.Org security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Aug 2006 08:09:58 +0000">
+ <metadata tag="requester" timestamp="2006-08-16T08:09:58Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 15:45:11 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T15:45:11Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 20:02:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T20:02:52Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-26.xml b/glsa-200608-26.xml
index 2aa95f85..1cfa393c 100644
--- a/glsa-200608-26.xml
+++ b/glsa-200608-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-26">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and/or the execution of arbitrary code.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 29, 2006</announced>
- <revised>August 29, 2006: 01</revised>
+ <announced>2006-08-29</announced>
+ <revised>2006-08-29: 01</revised>
<bug>144946</bug>
<access>remote</access>
<affected>
@@ -45,7 +44,7 @@
<p>
Disable the SCSI and Q.2931 dissectors with the "Analyse" and "Enabled
protocols" menus. Make sure the ESP decryption is disabled, with the
- "Edit -> Preferences -> Protocols -> ESP" menu.
+ "Edit -&gt; Preferences -&gt; Protocols -&gt; ESP" menu.
</p>
</workaround>
<resolution>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330">CVE-2006-4330</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331">CVE-2006-4331</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4332">CVE-2006-4332</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333">CVE-2006-4333</uri>
- <uri link="http://www.wireshark.org/security/wnpa-sec-2006-02.html">Wireshark official advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330">CVE-2006-4330</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331">CVE-2006-4331</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4332">CVE-2006-4332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333">CVE-2006-4333</uri>
+ <uri link="https://www.wireshark.org/security/wnpa-sec-2006-02.html">Wireshark official advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Aug 2006 07:36:40 +0000">
+ <metadata tag="requester" timestamp="2006-08-25T07:36:40Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:34:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:34:42Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 14:55:04 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T14:55:04Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-27.xml b/glsa-200608-27.xml
index b726542b..aef71728 100644
--- a/glsa-200608-27.xml
+++ b/glsa-200608-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-27">
<title>Motor: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">motor</product>
- <announced>August 29, 2006</announced>
- <revised>August 29, 2006: 01</revised>
+ <announced>2006-08-29</announced>
+ <revised>2006-08-29: 01</revised>
<bug>135020</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/motor-3.3.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/motor-3.3.0-r1"</code>
<p>
All motor 3.4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/motor-3.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/motor-3.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Aug 2006 15:20:34 +0000">
+ <metadata tag="requester" timestamp="2006-08-23T15:20:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:27:17Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 15:28:41 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T15:28:41Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200608-28.xml b/glsa-200608-28.xml
index feaa26fa..9eb1d58c 100644
--- a/glsa-200608-28.xml
+++ b/glsa-200608-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-28">
<title>PHP: Arbitary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>August 29, 2006</announced>
- <revised>March 29, 2008: 05</revised>
+ <announced>2006-08-29</announced>
+ <revised>2008-03-29: 05</revised>
<bug>143126</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.3-r1"</code>
<p>
All PHP 5.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020">CVE-2006-4020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020">CVE-2006-4020</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Aug 2006 20:16:18 +0000">
+ <metadata tag="requester" timestamp="2006-08-23T20:16:18Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:28:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:28:36Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 15:12:31 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T15:12:31Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200609-01.xml b/glsa-200609-01.xml
index a1f391be..4d0a585d 100644
--- a/glsa-200609-01.xml
+++ b/glsa-200609-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-01">
<title>Streamripper: Multiple remote buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>144861</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.61.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.61.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3124">CVE-2006-3124</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3124">CVE-2006-3124</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Sep 2006 14:37:38 +0000">
+ <metadata tag="requester" timestamp="2006-09-04T14:37:38Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Sep 2006 18:11:08 +0000">
+ <metadata tag="submitter" timestamp="2006-09-04T18:11:08Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:33:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:33:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-02.xml b/glsa-200609-02.xml
index 7056fa0f..e69a2c50 100644
--- a/glsa-200609-02.xml
+++ b/glsa-200609-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-02">
<title>GTetrinet: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">GTetrinet</product>
- <announced>September 06, 2006</announced>
- <revised>September 07, 2006: 02</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-07: 02</revised>
<bug>144867</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-puzzle/gtetrinet-0.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-puzzle/gtetrinet-0.7.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3125">CVE-2006-3125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3125">CVE-2006-3125</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 17:41:35 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T17:41:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Sep 2006 18:25:31 +0000">
+ <metadata tag="submitter" timestamp="2006-09-05T18:25:31Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:36:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:36:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-03.xml b/glsa-200609-03.xml
index 0ee6aa61..ada2fa47 100644
--- a/glsa-200609-03.xml
+++ b/glsa-200609-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-03">
<title>OpenTTD: Remote Denial of Service</title>
<synopsis>
The OpenTTD server is vulnerable to a remote Denial of Service.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>131010</bug>
<access>remote</access>
<affected>
@@ -45,19 +44,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.4.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.4.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1998">CVE-2006-1998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1999">CVE-2006-1999</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1998">CVE-2006-1998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1999">CVE-2006-1999</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 13:05:28 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T13:05:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Sep 2006 18:04:07 +0000">
+ <metadata tag="submitter" timestamp="2006-09-05T18:04:07Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Sep 2006 14:54:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-06T14:54:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-04.xml b/glsa-200609-04.xml
index cae9937b..973e327f 100644
--- a/glsa-200609-04.xml
+++ b/glsa-200609-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-04">
<title>LibXfont: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">LibXfont</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>144092</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467">CVE-2006-3467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467">CVE-2006-3467</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Aug 2006 17:04:06 +0000">
+ <metadata tag="requester" timestamp="2006-08-31T17:04:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Sep 2006 12:10:42 +0000">
+ <metadata tag="submitter" timestamp="2006-09-03T12:10:42Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:36:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:36:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-05.xml b/glsa-200609-05.xml
index e67dcc6c..53029814 100644
--- a/glsa-200609-05.xml
+++ b/glsa-200609-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-05">
<title>OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery</title>
<synopsis>
OpenSSL fails to properly validate PKCS #1 v1.5 signatures.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>September 07, 2006</announced>
- <revised>September 08, 2006: 02</revised>
+ <announced>2006-09-07</announced>
+ <revised>2006-09-08: 02</revised>
<bug>146375</bug>
<bug>146438</bug>
<access>remote</access>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7k&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7k"</code>
<p>
All AMD64 x86 emulation base libraries users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 19:16:58 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T19:16:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Sep 2006 10:57:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-06T10:57:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Sep 2006 20:02:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-07T20:02:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-06.xml b/glsa-200609-06.xml
index a7ef8602..f6da0661 100644
--- a/glsa-200609-06.xml
+++ b/glsa-200609-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-06">
<title>AdPlug: Multiple vulnerabilities</title>
<synopsis>
Multiple heap and buffer overflows exist in AdPlug.
</synopsis>
<product type="ebuild">adplug</product>
- <announced>September 12, 2006</announced>
- <revised>September 12, 2006: 01</revised>
+ <announced>2006-09-12</announced>
+ <revised>2006-09-12: 01</revised>
<bug>139593</bug>
<access>local</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/adplug-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/adplug-2.0.1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/439432/30/0/threaded">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Sep 2006 14:38:47 +0000">
+ <metadata tag="requester" timestamp="2006-09-06T14:38:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Sep 2006 23:03:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-06T23:03:51Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 00:51:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T00:51:08Z">
hlieberman
</metadata>
</glsa>
diff --git a/glsa-200609-07.xml b/glsa-200609-07.xml
index a20b7ac2..ecaa11fb 100644
--- a/glsa-200609-07.xml
+++ b/glsa-200609-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-07">
<title>LibXfont, monolithic X.org: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">libxfont</product>
- <announced>September 13, 2006</announced>
- <revised>September 13, 2006: 01</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-09-13: 01</revised>
<bug>145513</bug>
<access>local and remote</access>
<affected>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.1"</code>
<p>
All monolithic X.org users are advised to migrate to modular X.org.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3739">CVE-2006-3739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3740">CVE-2006-3740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3739">CVE-2006-3739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3740">CVE-2006-3740</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Sep 2006 16:30:32 +0000">
+ <metadata tag="requester" timestamp="2006-09-12T16:30:32Z">
frilled
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Sep 2006 18:16:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-12T18:16:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Sep 2006 08:07:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-13T08:07:36Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-08.xml b/glsa-200609-08.xml
index d7894a5b..8a9e043e 100644
--- a/glsa-200609-08.xml
+++ b/glsa-200609-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-08">
<title>xine-lib: Buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>September 13, 2006</announced>
- <revised>September 13, 2006: 01</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-09-13: 01</revised>
<bug>133520</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802">CVE-2006-2802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802">CVE-2006-2802</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Aug 2006 17:11:30 +0000">
+ <metadata tag="requester" timestamp="2006-08-31T17:11:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Sep 2006 12:33:52 +0000">
+ <metadata tag="submitter" timestamp="2006-09-07T12:33:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 15:13:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T15:13:19Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200609-09.xml b/glsa-200609-09.xml
index 39e07c3d..bdf8364b 100644
--- a/glsa-200609-09.xml
+++ b/glsa-200609-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-09">
<title>FFmpeg: Buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ffmpeg</product>
- <announced>September 13, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-12-13: 02</revised>
<bug>133520</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20060530&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20060530"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4799">CVE-2006-4799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800">CVE-2006-4800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4799">CVE-2006-4799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800">CVE-2006-4800</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 12 Sep 2006 15:05:01 +0000">
+ <metadata tag="submitter" timestamp="2006-09-12T15:05:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 15:13:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T15:13:14Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200609-10.xml b/glsa-200609-10.xml
index cba756ef..f1f3f822 100644
--- a/glsa-200609-10.xml
+++ b/glsa-200609-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-10">
<title>DokuWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>September 14, 2006</announced>
- <revised>September 14, 2006: 01</revised>
+ <announced>2006-09-14</announced>
+ <revised>2006-09-14: 01</revised>
<bug>146800</bug>
<access>remote</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309d&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309d"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4674">CVE-2006-4674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4675">CVE-2006-4675</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4679">CVE-2006-4679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4674">CVE-2006-4674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4675">CVE-2006-4675</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4679">CVE-2006-4679</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Sep 2006 07:55:18 +0000">
+ <metadata tag="submitter" timestamp="2006-09-14T07:55:18Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Sep 2006 15:09:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-14T15:09:04Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200609-11.xml b/glsa-200609-11.xml
index b74cb4d1..ae0f276f 100644
--- a/glsa-200609-11.xml
+++ b/glsa-200609-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-11">
<title>BIND: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certain conditions.
</synopsis>
<product type="ebuild">bind</product>
- <announced>September 15, 2006</announced>
- <revised>September 15, 2006: 01</revised>
+ <announced>2006-09-15</announced>
+ <revised>2006-09-15: 01</revised>
<bug>146486</bug>
<access>remote</access>
<affected>
@@ -55,25 +54,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.3.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.3.2-r4"</code>
<p>
All BIND 9.2 users should update to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.2.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.2.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Sep 2006 10:13:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-06T10:13:53Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Sep 2006 11:28:27 +0000">
+ <metadata tag="submitter" timestamp="2006-09-07T11:28:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Sep 2006 22:49:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-14T22:49:56Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-12.xml b/glsa-200609-12.xml
index 096a063b..4cd84ceb 100644
--- a/glsa-200609-12.xml
+++ b/glsa-200609-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-12">
<title>Mailman: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
file injection and XSS.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>September 19, 2006</announced>
- <revised>September 19, 2006: 01</revised>
+ <announced>2006-09-19</announced>
+ <revised>2006-09-19: 01</revised>
<bug>139976</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.9_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.9_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941">CVE-2006-2941</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3636">CVE-2006-3636</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941">CVE-2006-2941</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3636">CVE-2006-3636</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Sep 2006 10:21:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-14T10:21:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Sep 2006 16:20:16 +0000">
+ <metadata tag="submitter" timestamp="2006-09-14T16:20:16Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Sep 2006 07:26:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-19T07:26:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-13.xml b/glsa-200609-13.xml
index 7f9fcb8a..0b3c073c 100644
--- a/glsa-200609-13.xml
+++ b/glsa-200609-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-13">
<title>gzip: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and infinite loops, possibly allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>September 23, 2006</announced>
- <revised>September 23, 2006: 01</revised>
+ <announced>2006-09-23</announced>
+ <revised>2006-09-23: 01</revised>
<bug>145511</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/gzip-1.3.5-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/gzip-1.3.5-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334">CVE-2006-4334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334">CVE-2006-4334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Sep 2006 13:55:56 +0000">
+ <metadata tag="submitter" timestamp="2006-09-19T13:55:56Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Sep 2006 06:36:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-23T06:36:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-14.xml b/glsa-200609-14.xml
index 5903252a..18b4d8e8 100644
--- a/glsa-200609-14.xml
+++ b/glsa-200609-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-14">
<title>ImageMagick: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Imagemagick</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>144091</bug>
<bug>143533</bug>
<access>remote</access>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743">CVE-2006-3743</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744">CVE-2006-3744</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144">CVE-2006-4144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743">CVE-2006-3743</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744">CVE-2006-3744</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144">CVE-2006-4144</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Sep 2006 07:52:00 +0000">
+ <metadata tag="requester" timestamp="2006-09-19T07:52:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Sep 2006 10:27:30 +0000">
+ <metadata tag="submitter" timestamp="2006-09-22T10:27:30Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:09:30 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:09:30Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200609-15.xml b/glsa-200609-15.xml
index 3616bb7b..db3d289f 100644
--- a/glsa-200609-15.xml
+++ b/glsa-200609-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-15">
<title>GnuTLS: RSA Signature Forgery</title>
<synopsis>
@@ -8,8 +7,8 @@
PKCS #1 v1.5 signature.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>147682</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --update --ask --verbose &quot;&gt;=net-libs/gnutls-1.4.4&quot;</code>
+ # emerge --update --ask --verbose "&gt;=net-libs/gnutls-1.4.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790">CVE-2006-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790">CVE-2006-4790</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Sep 2006 06:35:02 +0000">
+ <metadata tag="requester" timestamp="2006-09-23T06:35:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Sep 2006 13:07:32 +0000">
+ <metadata tag="submitter" timestamp="2006-09-25T13:07:32Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:24:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:24:37Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200609-16.xml b/glsa-200609-16.xml
index a52abcdf..844f0afb 100644
--- a/glsa-200609-16.xml
+++ b/glsa-200609-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-16">
<title>Tikiwiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
second vulnerability which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>145714</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --oneshot --verbose --ask &quot;&gt;=www-apps/tikiwiki-1.9.5&quot;</code>
+ # emerge --oneshot --verbose --ask "&gt;=www-apps/tikiwiki-1.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4299">CVE-2006-4299</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4602">CVE-2006-4602</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4299">CVE-2006-4299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4602">CVE-2006-4602</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Sep 2006 09:06:28 +0000">
+ <metadata tag="requester" timestamp="2006-09-19T09:06:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Sep 2006 13:40:09 +0000">
+ <metadata tag="submitter" timestamp="2006-09-19T13:40:09Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:24:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:24:26Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200609-17.xml b/glsa-200609-17.xml
index 4c48ecd8..05e90990 100644
--- a/glsa-200609-17.xml
+++ b/glsa-200609-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-17">
<title>OpenSSH: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>September 27, 2006</announced>
- <revised>September 27, 2006: 02</revised>
+ <announced>2006-09-27</announced>
+ <revised>2006-09-27: 02</revised>
<bug>148228</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.3_p2-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.3_p2-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Sep 2006 22:24:46 +0000">
+ <metadata tag="submitter" timestamp="2006-09-21T22:24:46Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Sep 2006 16:06:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-27T16:06:09Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200609-18.xml b/glsa-200609-18.xml
index e983a81d..dcd3f742 100644
--- a/glsa-200609-18.xml
+++ b/glsa-200609-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-18">
<title>Opera: RSA signature forgery</title>
<synopsis>
Opera fails to correctly verify certain signatures.
</synopsis>
<product type="ebuild">opera</product>
- <announced>September 28, 2006</announced>
- <revised>September 28, 2006: 02</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-09-28: 02</revised>
<bug>147838</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.02"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=845">Opera Advisory</uri>
- <uri link="/security/en/glsa/glsa-200609-05.xml">GLSA 200609-05</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=845">Opera Advisory</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200609-05.xml">GLSA 200609-05</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 07:51:04 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T07:51:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Sep 2006 14:08:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-27T14:08:17Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Sep 2006 14:32:20 +0000">
+ <metadata tag="submitter" timestamp="2006-09-27T14:32:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200609-19.xml b/glsa-200609-19.xml
index cd49eae4..eae4a136 100644
--- a/glsa-200609-19.xml
+++ b/glsa-200609-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-19">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Firefox, including one that may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>September 28, 2006</announced>
- <revised>September 28, 2006: 01</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-09-28: 01</revised>
<bug>147652</bug>
<access>remote</access>
<affected>
@@ -52,28 +51,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.7"</code>
<p>
Users of the binary package should upgrade as well:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569">CVE-2006-4569</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569">CVE-2006-4569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Sep 2006 12:31:14 +0000">
+ <metadata tag="submitter" timestamp="2006-09-25T12:31:14Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 12:31:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T12:31:29Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200609-20.xml b/glsa-200609-20.xml
index d8e8b414..867de26f 100644
--- a/glsa-200609-20.xml
+++ b/glsa-200609-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-20">
<title>DokuWiki: Shell command injection and Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks when using ImageMagick.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>September 28, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-12-13: 02</revised>
<bug>149266</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309e"</code>
</resolution>
<references>
- <uri link="http://www.freelists.org/archives/dokuwiki/09-2006/msg00278.html">DokuWiki Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5098">CVE-2006-5098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5099">CVE-2006-5099</uri>
+ <uri link="https://www.freelists.org/archives/dokuwiki/09-2006/msg00278.html">DokuWiki Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5098">CVE-2006-5098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5099">CVE-2006-5099</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 14:05:04 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T14:05:04Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Sep 2006 14:54:15 +0000">
+ <metadata tag="submitter" timestamp="2006-09-27T14:54:15Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Sep 2006 14:27:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-28T14:27:52Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200610-01.xml b/glsa-200610-01.xml
index 58dee86a..83855ade 100644
--- a/glsa-200610-01.xml
+++ b/glsa-200610-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-01">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Thunderbird.
</synopsis>
<product type="ebuild">thunderbird</product>
- <announced>October 04, 2006</announced>
- <revised>October 04, 2006: 01</revised>
+ <announced>2006-10-04</announced>
+ <revised>2006-10-04: 01</revised>
<bug>147653</bug>
<access>remote</access>
<affected>
@@ -53,31 +52,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.7"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Sep 2006 19:46:25 +0000">
+ <metadata tag="requester" timestamp="2006-09-28T19:46:25Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Sep 2006 21:05:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-29T21:05:25Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Sep 2006 21:18:44 +0000">
+ <metadata tag="submitter" timestamp="2006-09-30T21:18:44Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200610-02.xml b/glsa-200610-02.xml
index eff012fa..7a16b9e1 100644
--- a/glsa-200610-02.xml
+++ b/glsa-200610-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-02">
<title>Adobe Flash Player: Arbitrary code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>October 04, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-10-04</announced>
+ <revised>2009-05-28: 02</revised>
<bug>147421</bug>
<access>remote</access>
<affected>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.68&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.68"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb06-11.html">Adobe Security Bulletin</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3311">CVE-2006-3311</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3587">CVE-2006-3587</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3588">CVE-2006-3588</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb06-11.html">Adobe Security Bulletin</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3311">CVE-2006-3311</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3587">CVE-2006-3587</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3588">CVE-2006-3588</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Sep 2006 20:50:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-30T20:50:53Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Oct 2006 12:49:26 +0000">
+ <metadata tag="submitter" timestamp="2006-10-01T12:49:26Z">
plasmaroo
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 01 Oct 2006 12:51:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-01T12:51:08Z">
plasmaroo
</metadata>
</glsa>
diff --git a/glsa-200610-03.xml b/glsa-200610-03.xml
index f64cdbb1..316a62e8 100644
--- a/glsa-200610-03.xml
+++ b/glsa-200610-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-03">
<title>ncompress: Buffer Underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">ncompress</product>
- <announced>October 06, 2006</announced>
- <revised>October 06, 2006: 01</revised>
+ <announced>2006-10-06</announced>
+ <revised>2006-10-06: 01</revised>
<bug>141728</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/ncompress-4.2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/ncompress-4.2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168">CVE-2006-1168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168">CVE-2006-1168</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Sep 2006 14:20:45 +0000">
+ <metadata tag="requester" timestamp="2006-09-29T14:20:45Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Oct 2006 10:06:04 +0000">
+ <metadata tag="submitter" timestamp="2006-10-02T10:06:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Oct 2006 17:50:24 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-06T17:50:24Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-04.xml b/glsa-200610-04.xml
index 39a1fc55..e4225d49 100644
--- a/glsa-200610-04.xml
+++ b/glsa-200610-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-04">
<title>Seamonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
application.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>October 16, 2006</announced>
- <revised>October 16, 2006: 01</revised>
+ <announced>2006-10-16</announced>
+ <revised>2006-10-16: 01</revised>
<bug>147651</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Oct 2006 11:17:26 +0000">
+ <metadata tag="submitter" timestamp="2006-10-11T11:17:26Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Oct 2006 13:40:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-13T13:40:59Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-05.xml b/glsa-200610-05.xml
index 157a9995..535fd0f7 100644
--- a/glsa-200610-05.xml
+++ b/glsa-200610-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-05">
<title>CAPI4Hylafax fax receiver: Execution of arbitrary code</title>
<synopsis>
CAPI4Hylafax allows remote attackers to execute arbitrary commands.
</synopsis>
<product type="ebuild">capi4hylafax</product>
- <announced>October 17, 2006</announced>
- <revised>October 17, 2006: 01</revised>
+ <announced>2006-10-17</announced>
+ <revised>2006-10-17: 01</revised>
<bug>145982</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/capi4hylafax-01.03.00.99.300.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/capi4hylafax-01.03.00.99.300.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126">CVE-2006-3126</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126">CVE-2006-3126</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Oct 2006 11:18:55 +0000">
+ <metadata tag="requester" timestamp="2006-10-11T11:18:55Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 13:56:18 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T13:56:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Oct 2006 13:57:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-13T13:57:08Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-06.xml b/glsa-200610-06.xml
index fdaf5eee..b6b18e37 100644
--- a/glsa-200610-06.xml
+++ b/glsa-200610-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-06">
<title>Mozilla Network Security Service (NSS): RSA signature forgery</title>
<synopsis>
NSS fails to properly validate PKCS #1 v1.5 signatures.
</synopsis>
<product type="ebuild">nss</product>
- <announced>October 17, 2006</announced>
- <revised>October 17, 2006: 01</revised>
+ <announced>2006-10-17</announced>
+ <revised>2006-10-17: 01</revised>
<bug>148283</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/nss-3.11.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/nss-3.11.3"</code>
<p>
Note: As usual after updating a library, you should run
'revdep-rebuild' (from the app-portage/gentoolkit package) to ensure
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Sep 2006 12:57:17 +0000">
+ <metadata tag="requester" timestamp="2006-09-25T12:57:17Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Oct 2006 18:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-03T18:27:05Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Oct 2006 19:45:16 +0000">
+ <metadata tag="submitter" timestamp="2006-10-08T19:45:16Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200610-07.xml b/glsa-200610-07.xml
index 287ef098..2b090f80 100644
--- a/glsa-200610-07.xml
+++ b/glsa-200610-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-07">
<title>Python: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and potentially allows the execution of arbitrary code.
</synopsis>
<product type="ebuild">python</product>
- <announced>October 17, 2006</announced>
- <revised>February 26, 2007: 03</revised>
+ <announced>2006-10-17</announced>
+ <revised>2007-02-26: 03</revised>
<bug>149065</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980">CVE-2006-4980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980">CVE-2006-4980</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 19:59:22 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T19:59:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 14:44:47 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T14:44:47Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Oct 2006 09:21:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-16T09:21:34Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-08.xml b/glsa-200610-08.xml
index 7b0ac149..590dcae4 100644
--- a/glsa-200610-08.xml
+++ b/glsa-200610-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-08">
<title>Cscope: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>October 20, 2006</announced>
- <revised>October 20, 2006: 01</revised>
+ <announced>2006-10-20</announced>
+ <revised>2006-10-20: 01</revised>
<bug>144869</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5.20060927&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5.20060927"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262">CVE-2006-4262</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262">CVE-2006-4262</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 20:32:19 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T20:32:19Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Oct 2006 20:33:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-18T20:33:33Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-09.xml b/glsa-200610-09.xml
index 1bc29ae1..39527b9c 100644
--- a/glsa-200610-09.xml
+++ b/glsa-200610-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-09">
<title>libmusicbrainz: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service or possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">libmusicbrainz</product>
- <announced>October 22, 2006</announced>
- <revised>October 22, 2006: 01</revised>
+ <announced>2006-10-22</announced>
+ <revised>2006-10-22: 01</revised>
<bug>144089</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/musicbrainz-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/musicbrainz-2.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197">CVE-2006-4197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197">CVE-2006-4197</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Oct 2006 12:31:28 +0000">
+ <metadata tag="requester" timestamp="2006-10-18T12:31:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Oct 2006 20:02:01 +0000">
+ <metadata tag="submitter" timestamp="2006-10-19T20:02:01Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 Oct 2006 14:53:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-20T14:53:09Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200610-10.xml b/glsa-200610-10.xml
index 681ac8df..9d8c8d7f 100644
--- a/glsa-200610-10.xml
+++ b/glsa-200610-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-10">
<title>ClamAV: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>151561</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.5"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=455799">Original commit log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182">CVE-2006-4182</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=455799">Original commit log</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182">CVE-2006-4182</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 16 Oct 2006 11:34:35 +0000">
+ <metadata tag="submitter" timestamp="2006-10-16T11:34:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:39:53 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:39:53Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-11.xml b/glsa-200610-11.xml
index 47a01d5d..8f001e3e 100644
--- a/glsa-200610-11.xml
+++ b/glsa-200610-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-11">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>145510</bug>
<access>remote</access>
<affected>
@@ -58,27 +57,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8d&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8d"</code>
<p>
All OpenSSL 0.9.7 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7l&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7l"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Sep 2006 15:36:31 +0000">
+ <metadata tag="requester" timestamp="2006-09-28T15:36:31Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 16:05:39 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T16:05:39Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 10:05:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T10:05:56Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-12.xml b/glsa-200610-12.xml
index 621d4711..8f89b31d 100644
--- a/glsa-200610-12.xml
+++ b/glsa-200610-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-12">
<title>Apache mod_tcl: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mod_tcl</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>151359</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_tcl-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_tcl-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4154">CVE-2006-4154</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4154">CVE-2006-4154</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 21 Oct 2006 12:26:41 +0000">
+ <metadata tag="requester" timestamp="2006-10-21T12:26:41Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Oct 2006 20:37:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-21T20:37:41Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Oct 2006 14:13:35 +0000">
+ <metadata tag="submitter" timestamp="2006-10-23T14:13:35Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200610-13.xml b/glsa-200610-13.xml
index c20b187c..26d6682a 100644
--- a/glsa-200610-13.xml
+++ b/glsa-200610-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-13">
<title>Cheese Tracker: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cheesetracker</product>
- <announced>October 26, 2006</announced>
- <revised>October 26, 2006: 01</revised>
+ <announced>2006-10-26</announced>
+ <revised>2006-10-26: 01</revised>
<bug>142391</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/cheesetracker-0.9.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/cheesetracker-0.9.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3814">CVE-2006-3814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3814">CVE-2006-3814</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Oct 2006 07:43:58 +0000">
+ <metadata tag="requester" timestamp="2006-10-20T07:43:58Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:33:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:33:27Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 15:18:21 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T15:18:21Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-14.xml b/glsa-200610-14.xml
index 44f4bea0..7d677577 100644
--- a/glsa-200610-14.xml
+++ b/glsa-200610-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-14">
<title>PHP: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 30, 2006</announced>
- <revised>March 29, 2008: 04</revised>
+ <announced>2006-10-30</announced>
+ <revised>2008-03-29: 04</revised>
<bug>150261</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.6-r6"</code>
<p>
All PHP 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812">CVE-2006-4812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812">CVE-2006-4812</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Oct 2006 12:42:57 +0000">
+ <metadata tag="requester" timestamp="2006-10-18T12:42:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 18:52:45 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T18:52:45Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 10:10:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T10:10:01Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200610-15.xml b/glsa-200610-15.xml
index d4d39ae2..557a1164 100644
--- a/glsa-200610-15.xml
+++ b/glsa-200610-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-15">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>October 30, 2006</announced>
- <revised>January 30, 2007: 02</revised>
+ <announced>2006-10-30</announced>
+ <revised>2007-01-30: 02</revised>
<bug>144941</bug>
<bug>151881</bug>
<access>remote</access>
@@ -62,18 +61,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4345">CVE-2006-4345</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4346">CVE-2006-4346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5444">CVE-2006-5444</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5445">CVE-2006-5445</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4345">CVE-2006-4345</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4346">CVE-2006-4346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5444">CVE-2006-5444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5445">CVE-2006-5445</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 20:57:57 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T20:57:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Oct 2006 20:37:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-21T20:37:32Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-01.xml b/glsa-200611-01.xml
index 27f721e4..0e37a8e4 100644
--- a/glsa-200611-01.xml
+++ b/glsa-200611-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-01">
<title>Screen: UTF-8 character handling vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">screen</product>
- <announced>November 03, 2006</announced>
- <revised>November 03, 2006: 01</revised>
+ <announced>2006-11-03</announced>
+ <revised>2006-11-03: 01</revised>
<bug>152770</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/screen-4.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/screen-4.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573">CVE-2006-4573</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573">CVE-2006-4573</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 27 Oct 2006 12:01:54 +0000">
+ <metadata tag="submitter" timestamp="2006-10-27T12:01:54Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Oct 2006 11:11:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-30T11:11:00Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-02.xml b/glsa-200611-02.xml
index 202a5827..682d524e 100644
--- a/glsa-200611-02.xml
+++ b/glsa-200611-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-02">
<title>Qt: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>November 06, 2006</announced>
- <revised>January 09, 2009: 03</revised>
+ <announced>2006-11-06</announced>
+ <revised>2009-01-09: 03</revised>
<bug>151838</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.6-r4"</code>
<p>
All Qt 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-4.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-4.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Nov 2006 16:27:07 +0000">
+ <metadata tag="requester" timestamp="2006-11-01T16:27:07Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Nov 2006 14:09:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-02T14:09:09Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Nov 2006 11:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-06T11:05:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/glsa-200611-03.xml b/glsa-200611-03.xml
index 7a35f9c9..ceb5f254 100644
--- a/glsa-200611-03.xml
+++ b/glsa-200611-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-03">
<title>NVIDIA binary graphics driver: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation through an X session.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>November 07, 2006</announced>
- <revised>November 10, 2006: 02</revised>
+ <announced>2006-11-07</announced>
+ <revised>2006-11-10: 02</revised>
<bug>151635</bug>
<access>remote, local</access>
<affected>
@@ -48,7 +47,7 @@
Disable the accelerated rendering functionality in the Device section
of xorg.conf :
</p>
- <code>Option &quot;RenderAccel&quot; &quot;false&quot;</code>
+ <code>Option "RenderAccel" "false"</code>
</workaround>
<resolution>
<p>
@@ -57,18 +56,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-drivers/nvidia-drivers-1.0.8776&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-drivers/nvidia-drivers-1.0.8776"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5379">CVE-2006-5379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5379">CVE-2006-5379</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Oct 2006 09:12:20 +0000">
+ <metadata tag="requester" timestamp="2006-10-24T09:12:20Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 14:25:34 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T14:25:34Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:27:05Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-04.xml b/glsa-200611-04.xml
index 5774591c..7a5152db 100644
--- a/glsa-200611-04.xml
+++ b/glsa-200611-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-04">
<title>Bugzilla: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
request forgery.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>November 09, 2006</announced>
- <revised>November 09, 2006: 01</revised>
+ <announced>2006-11-09</announced>
+ <revised>2006-11-09: 01</revised>
<bug>151563</bug>
<access>remote</access>
<affected>
@@ -69,20 +68,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-2.18.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-2.18.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5453">CVE-2006-5453</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5454">CVE-2006-5454</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5455">CVE-2006-5455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5453">CVE-2006-5453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5454">CVE-2006-5454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5455">CVE-2006-5455</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Nov 2006 19:51:46 +0000">
+ <metadata tag="requester" timestamp="2006-11-04T19:51:46Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Nov 2006 14:49:56 +0000">
+ <metadata tag="submitter" timestamp="2006-11-05T14:49:56Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 15:44:40 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T15:44:40Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-05.xml b/glsa-200611-05.xml
index 31088947..524e60de 100644
--- a/glsa-200611-05.xml
+++ b/glsa-200611-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-05">
<title>Netkit FTP Server: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
directories that would normally be inaccessible.
</synopsis>
<product type="ebuild">ftpd</product>
- <announced>November 10, 2006</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2006-11-10</announced>
+ <revised>2007-12-30: 02</revised>
<bug>150292</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5778">CVE-2006-5778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5778">CVE-2006-5778</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 15:02:54 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T15:02:54Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 15:03:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T15:03:34Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-06.xml b/glsa-200611-06.xml
index 32720e8e..93272000 100644
--- a/glsa-200611-06.xml
+++ b/glsa-200611-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-06">
<title>OpenSSH: Multiple Denial of Service vulnerabilities</title>
<synopsis>
Several Denial of Service vulnerabilities have been identified in OpenSSH.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>149502</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.4_p1-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.4_p1-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052">CVE-2006-5052</uri>
- <uri link="http://www.openssh.com/txt/release-4.4">OpenSSH Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052">CVE-2006-5052</uri>
+ <uri link="https://www.openssh.com/txt/release-4.4">OpenSSH Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 00:03:31 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T00:03:31Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Nov 2006 12:18:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-06T12:18:14Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 19:31:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T19:31:09Z">
daxomatic
</metadata>
</glsa>
diff --git a/glsa-200611-07.xml b/glsa-200611-07.xml
index 888c49fc..57ad9c35 100644
--- a/glsa-200611-07.xml
+++ b/glsa-200611-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-07">
<title>GraphicsMagick: PALM and DCM buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>152668</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.7-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 14:10:18 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T14:10:18Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 23:27:19 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T23:27:19Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 12:33:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T12:33:19Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-08.xml b/glsa-200611-08.xml
index 7d214d2e..0e059de9 100644
--- a/glsa-200611-08.xml
+++ b/glsa-200611-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-08">
<title>RPM: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when opening specially crafted packages.
</synopsis>
<product type="ebuild">rpm</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>154218</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rpm-4.4.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rpm-4.4.6-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5466">CVE-2006-5466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5466">CVE-2006-5466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 23:03:12 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T23:03:12Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 23:11:11 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T23:11:11Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 13:44:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T13:44:27Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-09.xml b/glsa-200611-09.xml
index 8b8c3154..3908071a 100644
--- a/glsa-200611-09.xml
+++ b/glsa-200611-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-09">
<title>libpng: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 17, 2006</announced>
- <revised>November 17, 2006: 01</revised>
+ <announced>2006-11-17</announced>
+ <revised>2006-11-17: 01</revised>
<bug>154380</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793">CVE-2006-5793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793">CVE-2006-5793</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 11:17:04 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T11:17:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 15:07:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T15:07:26Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200611-10.xml b/glsa-200611-10.xml
index 785cf001..4f31d6c9 100644
--- a/glsa-200611-10.xml
+++ b/glsa-200611-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-10">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
metadata and the overwriting of restricted files.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>November 17, 2006</announced>
- <revised>November 17, 2006: 01</revised>
+ <announced>2006-11-17</announced>
+ <revised>2006-11-17: 01</revised>
<bug>153303</bug>
<access>remote</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705">CVE-2006-5705</uri>
- <uri link="http://trac.wordpress.org/ticket/3142">WordPress Ticket 3142</uri>
- <uri link="http://trac.wordpress.org/ticket/2591">WordPress Ticket 2591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705">CVE-2006-5705</uri>
+ <uri link="https://trac.wordpress.org/ticket/3142">WordPress Ticket 3142</uri>
+ <uri link="https://trac.wordpress.org/ticket/2591">WordPress Ticket 2591</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Nov 2006 12:56:04 +0000">
+ <metadata tag="submitter" timestamp="2006-11-08T12:56:04Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Nov 2006 06:33:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-09T06:33:42Z">
frilled
</metadata>
</glsa>
diff --git a/glsa-200611-11.xml b/glsa-200611-11.xml
index 9cd741f8..1e700fa4 100644
--- a/glsa-200611-11.xml
+++ b/glsa-200611-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-11">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
credentials and for cross-site scripting attacks.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>November 20, 2006</announced>
- <revised>November 20, 2006: 01</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-20: 01</revised>
<bug>153820</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702">CVE-2006-5702</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5703">CVE-2006-5703</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702">CVE-2006-5702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5703">CVE-2006-5703</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Nov 2006 17:34:20 +0000">
+ <metadata tag="requester" timestamp="2006-11-10T17:34:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 18:20:06 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T18:20:06Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Nov 2006 22:24:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-13T22:24:46Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-12.xml b/glsa-200611-12.xml
index a8d53e22..d1fe6d22 100644
--- a/glsa-200611-12.xml
+++ b/glsa-200611-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-12">
<title>Ruby: Denial of Service vulnerability</title>
<synopsis>
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>November 20, 2006</announced>
- <revised>June 11, 2009: 02</revised>
+ <announced>2006-11-20</announced>
+ <revised>2009-06-11: 02</revised>
<bug>153497</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467">CVE-2006-5467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467">CVE-2006-5467</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 13:03:41 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T13:03:41Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:17:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:17:28Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200611-13.xml b/glsa-200611-13.xml
index 29b6b175..302a5bc7 100644
--- a/glsa-200611-13.xml
+++ b/glsa-200611-13.xml
@@ -1,15 +1,14 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-13">
- <title>Avahi: &quot;netlink&quot; message vulnerability</title>
+ <title>Avahi: "netlink" message vulnerability</title>
<synopsis>
Avahi fails to verify the origin of netlink messages, which could allow
local users to spoof network changes.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>November 20, 2006</announced>
- <revised>November 20, 2006: 01</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-20: 01</revised>
<bug>154322</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461">CVE-2006-5461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461">CVE-2006-5461</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Nov 2006 11:46:25 +0000">
+ <metadata tag="requester" timestamp="2006-11-16T11:46:25Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 11:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T11:47:51Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:40:32 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:40:32Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-14.xml b/glsa-200611-14.xml
index f0271113..4c48d8de 100644
--- a/glsa-200611-14.xml
+++ b/glsa-200611-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-14">
<title>TORQUE: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">torque</product>
- <announced>November 20, 2006</announced>
- <revised>November 24, 2006: 03</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-24: 03</revised>
<bug>152104</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/torque-2.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/torque-2.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5677">CVE-2006-5677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5677">CVE-2006-5677</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 20:45:04 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T20:45:04Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 11:48:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T11:48:29Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:31:55 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:31:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-15.xml b/glsa-200611-15.xml
index 4d1325a2..deb58d8d 100644
--- a/glsa-200611-15.xml
+++ b/glsa-200611-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-15">
<title>qmailAdmin: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">qmailadmin</product>
- <announced>November 21, 2006</announced>
- <revised>November 21, 2006: 01</revised>
+ <announced>2006-11-21</announced>
+ <revised>2006-11-21: 01</revised>
<bug>153896</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/qmailadmin-1.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/qmailadmin-1.2.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1141">CVE-2006-1141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1141">CVE-2006-1141</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 21:38:39 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T21:38:39Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:39:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:39:01Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:53:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:53:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-16.xml b/glsa-200611-16.xml
index bb1874a3..68fbb108 100644
--- a/glsa-200611-16.xml
+++ b/glsa-200611-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-16">
<title>Texinfo: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">texinfo</product>
- <announced>November 21, 2006</announced>
- <revised>November 21, 2006: 01</revised>
+ <announced>2006-11-21</announced>
+ <revised>2006-11-21: 01</revised>
<bug>154316</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/texinfo-4.8-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/texinfo-4.8-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810">CVE-2006-4810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810">CVE-2006-4810</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 21:23:53 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T21:23:53Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:39:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:39:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Nov 2006 14:40:00 +0000">
+ <metadata tag="submitter" timestamp="2006-11-16T14:40:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-17.xml b/glsa-200611-17.xml
index c00a28ec..cdf77712 100644
--- a/glsa-200611-17.xml
+++ b/glsa-200611-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-17">
<title>fvwm: fvwm-menu-directory fvwm command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands with the privileges of another user.
</synopsis>
<product type="ebuild">fvwm</product>
- <announced>November 23, 2006</announced>
- <revised>November 23, 2006: 01</revised>
+ <announced>2006-11-23</announced>
+ <revised>2006-11-23: 01</revised>
<bug>155078</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-wm/fvwm-2.5.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-wm/fvwm-2.5.18-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969">CVE-2006-5969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969">CVE-2006-5969</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 05:59:03 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T05:59:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 05:59:31 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T05:59:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 11:10:22 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T11:10:22Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200611-18.xml b/glsa-200611-18.xml
index 56f22150..9b335b95 100644
--- a/glsa-200611-18.xml
+++ b/glsa-200611-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-18">
<title>TIN: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">tin</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>150229</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/tin-1.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/tin-1.8.2"</code>
</resolution>
<references>
<uri link="http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.005-tin.html">OpenPKG Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0804">CVE-2006-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0804">CVE-2006-0804</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 07:44:01 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T07:44:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 07:44:13 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T07:44:13Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 14:05:36 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T14:05:36Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200611-19.xml b/glsa-200611-19.xml
index c95db6da..e22b7e15 100644
--- a/glsa-200611-19.xml
+++ b/glsa-200611-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-19">
<title>ImageMagick: PALM and DCM buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>152672</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 07:20:25 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T07:20:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Nov 2006 15:07:36 +0000">
+ <metadata tag="submitter" timestamp="2006-11-22T15:07:36Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:28:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:28:35Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-20.xml b/glsa-200611-20.xml
index 4187a07a..177b571f 100644
--- a/glsa-200611-20.xml
+++ b/glsa-200611-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-20">
<title>GNU gv: Stack overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gv</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>154573</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gv-3.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gv-3.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:07:37 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:07:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 14:27:05 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T14:27:05Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 20:18:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T20:18:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-21.xml b/glsa-200611-21.xml
index a00511d0..d968f2a7 100644
--- a/glsa-200611-21.xml
+++ b/glsa-200611-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-21">
<title>Kile: Incorrect backup file permission</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure.
</synopsis>
<product type="ebuild">kile</product>
- <announced>November 27, 2006</announced>
- <revised>November 27, 2006: 01</revised>
+ <announced>2006-11-27</announced>
+ <revised>2006-11-27: 01</revised>
<bug>155613</bug>
<access>local</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/kile-1.9.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/kile-1.9.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920">CVE-2005-1920</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920">CVE-2005-1920</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 10:25:19 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T10:25:19Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 07:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T07:49:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-22.xml b/glsa-200611-22.xml
index 295933cb..fa4a42fd 100644
--- a/glsa-200611-22.xml
+++ b/glsa-200611-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-22">
<title>Ingo H3: Folder name shell command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
procmail rules.
</synopsis>
<product type="ebuild">horde-ingo</product>
- <announced>November 27, 2006</announced>
- <revised>November 27, 2006: 01</revised>
+ <announced>2006-11-27</announced>
+ <revised>2006-11-27: 01</revised>
<bug>153927</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-ingo-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-ingo-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5449">CVE-2006-5449</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5449">CVE-2006-5449</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:42:39 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:42:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 19:04:29 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T19:04:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:46:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:46:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200611-23.xml b/glsa-200611-23.xml
index e896c99f..ec614e53 100644
--- a/glsa-200611-23.xml
+++ b/glsa-200611-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-23">
<title>Mono: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">mono</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>150264</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.1.13.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.1.13.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5072">CVE-2006-5072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5072">CVE-2006-5072</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Nov 2006 09:48:51 +0000">
+ <metadata tag="requester" timestamp="2006-11-24T09:48:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:16:01 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T17:16:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Nov 2006 12:13:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-28T12:13:57Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-24.xml b/glsa-200611-24.xml
index 5d922728..e16a421e 100644
--- a/glsa-200611-24.xml
+++ b/glsa-200611-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-24">
<title>LHa: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">lha</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>151252</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/lha-114i-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/lha-114i-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Nov 2006 21:52:23 +0000">
+ <metadata tag="requester" timestamp="2006-11-24T21:52:23Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:02:28 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T17:02:28Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 17:07:24 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T17:07:24Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-25.xml b/glsa-200611-25.xml
index b827faff..d483e8dd 100644
--- a/glsa-200611-25.xml
+++ b/glsa-200611-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-25">
<title>OpenLDAP: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>154349</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-nds/openldap&quot;</code>
+ # emerge --ask --oneshot --verbose "net-nds/openldap"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779">CVE-2006-5779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779">CVE-2006-5779</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Nov 2006 13:22:56 +0000">
+ <metadata tag="requester" timestamp="2006-11-27T13:22:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 16:35:57 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T16:35:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 16:37:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T16:37:27Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200611-26.xml b/glsa-200611-26.xml
index d9c96597..4c65ce0a 100644
--- a/glsa-200611-26.xml
+++ b/glsa-200611-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-26">
<title>ProFTPD: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>November 30, 2006</announced>
- <revised>November 30, 2006: 01</revised>
+ <announced>2006-11-30</announced>
+ <revised>2006-11-30: 01</revised>
<bug>154650</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.0a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.0a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815">CVE-2006-5815</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170">CVE-2006-6170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171">CVE-2006-6171 (disputed)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815">CVE-2006-5815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170">CVE-2006-6170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171">CVE-2006-6171 (disputed)</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Nov 2006 20:50:41 +0000">
+ <metadata tag="requester" timestamp="2006-11-28T20:50:41Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Nov 2006 12:52:56 +0000">
+ <metadata tag="submitter" timestamp="2006-11-29T12:52:56Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Nov 2006 22:38:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-30T22:38:58Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-01.xml b/glsa-200612-01.xml
index 23e95184..c0e11a0f 100644
--- a/glsa-200612-01.xml
+++ b/glsa-200612-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-01">
<title>wv library: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">wv library</product>
- <announced>December 07, 2006</announced>
- <revised>December 07, 2006: 01</revised>
+ <announced>2006-12-07</announced>
+ <revised>2006-12-07: 01</revised>
<bug>153800</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/wv-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/wv-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4513">CVE-2006-4513</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4513">CVE-2006-4513</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 19:24:02 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T19:24:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:46:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:46:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200612-02.xml b/glsa-200612-02.xml
index e2fb9632..73129074 100644
--- a/glsa-200612-02.xml
+++ b/glsa-200612-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-02">
<title>xine-lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>December 09, 2006</announced>
- <revised>December 09, 2006: 01</revised>
+ <announced>2006-12-09</announced>
+ <revised>2006-12-09: 01</revised>
<bug>156645</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Dec 2006 14:51:06 +0000">
+ <metadata tag="requester" timestamp="2006-12-03T14:51:06Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Dec 2006 10:43:19 +0000">
+ <metadata tag="submitter" timestamp="2006-12-07T10:43:19Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Dec 2006 07:44:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-09T07:44:10Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200612-03.xml b/glsa-200612-03.xml
index bf572160..1044fae4 100644
--- a/glsa-200612-03.xml
+++ b/glsa-200612-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-03">
<title>GnuPG: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
dereference that can result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 02</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 02</revised>
<bug>156476</bug>
<bug>156947</bug>
<access>remote</access>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=app-crypt/gnupg-1.4*&quot;</code>
+ # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169">CVE-2006-6169</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235">CVE-2006-6235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169">CVE-2006-6169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235">CVE-2006-6235</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 11:29:58 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T11:29:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Dec 2006 11:06:22 +0000">
+ <metadata tag="submitter" timestamp="2006-12-08T11:06:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Dec 2006 21:41:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-09T21:41:04Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-04.xml b/glsa-200612-04.xml
index 7ce79080..60253388 100644
--- a/glsa-200612-04.xml
+++ b/glsa-200612-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-04">
<title>ModPlug: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows resulting in the possible execution of arbitrary code.
</synopsis>
<product type="ebuild">libmodplug</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>143404</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libmodplug-0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libmodplug-0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4192">CVE-2006-4192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4192">CVE-2006-4192</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Dec 2006 19:55:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-05T19:55:31Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Dec 2006 10:06:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-07T10:06:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Dec 2006 13:57:46 +0000">
+ <metadata tag="submitter" timestamp="2006-12-08T13:57:46Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-05.xml b/glsa-200612-05.xml
index c4ed1719..a0c40695 100644
--- a/glsa-200612-05.xml
+++ b/glsa-200612-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-05">
<title>KOffice shared libraries: Heap corruption</title>
<synopsis>
@@ -9,8 +8,8 @@
files.
</synopsis>
<product type="ebuild">koffice-libs</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>155914</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-libs-1.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-libs-1.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6120">CVE-2006-6120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6120">CVE-2006-6120</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Dec 2006 20:55:38 +0000">
+ <metadata tag="requester" timestamp="2006-12-01T20:55:38Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Dec 2006 21:30:45 +0000">
+ <metadata tag="submitter" timestamp="2006-12-01T21:30:45Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 13:39:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T13:39:48Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200612-06.xml b/glsa-200612-06.xml
index 3102c1f9..2e3c6417 100644
--- a/glsa-200612-06.xml
+++ b/glsa-200612-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-06">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in Mozilla Thunderbird.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154448</bug>
<access>remote</access>
<affected>
@@ -65,36 +64,36 @@
display certain messages in some cases.
</p>
<p>
- <br></br>
- <br></br> All Mozilla Thunderbird users should upgrade to the
+ <br/>
+ <br/> All Mozilla Thunderbird users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.8"</code>
<p>
All Mozilla Thunderbird binary release users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360409">Mozilla Thunderbird Email Loss Bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:10:05 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:10:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 06:10:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T06:10:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:53:32 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:53:32Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200612-07.xml b/glsa-200612-07.xml
index 0440aba0..b0fcc3d0 100644
--- a/glsa-200612-07.xml
+++ b/glsa-200612-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-07">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Mozilla Firefox.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154434</bug>
<access>remote</access>
<affected>
@@ -59,29 +58,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.8"</code>
<p>
All Mozilla Firefox binary release users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:11:10 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:11:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 06:11:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T06:11:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:30:11 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:30:11Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200612-08.xml b/glsa-200612-08.xml
index bd859b46..42798f51 100644
--- a/glsa-200612-08.xml
+++ b/glsa-200612-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-08">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in the SeaMonkey project.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154449</bug>
<access>remote</access>
<affected>
@@ -50,22 +49,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:08:42 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:08:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:46:12 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:46:12Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 19:01:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T19:01:27Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-09.xml b/glsa-200612-09.xml
index 5991953c..58a7b966 100644
--- a/glsa-200612-09.xml
+++ b/glsa-200612-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-09">
<title>MadWifi: Kernel driver buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>157449</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332">CVE-2006-6332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332">CVE-2006-6332</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 19:16:43 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T19:16:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Dec 2006 22:47:16 +0000">
+ <metadata tag="submitter" timestamp="2006-12-07T22:47:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 21:00:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T21:00:26Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200612-10.xml b/glsa-200612-10.xml
index dc3ea0b0..990be3b2 100644
--- a/glsa-200612-10.xml
+++ b/glsa-200612-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-10">
<title>Tar: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
overwriting of arbitrary files.
</synopsis>
<product type="ebuild">tar</product>
- <announced>December 11, 2006</announced>
- <revised>December 11, 2006: 01</revised>
+ <announced>2006-12-11</announced>
+ <revised>2006-12-11: 01</revised>
<bug>155901</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.16-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.16-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097">CVE-2006-6097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097">CVE-2006-6097</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 10:14:08 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T10:14:08Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 20:35:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T20:35:35Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 17:59:09 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T17:59:09Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200612-11.xml b/glsa-200612-11.xml
index b0d80e7f..dd92fcdf 100644
--- a/glsa-200612-11.xml
+++ b/glsa-200612-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-11">
<title>AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of remote arbitrary code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>December 11, 2006</announced>
- <revised>December 11, 2006: 01</revised>
+ <announced>2006-12-11</announced>
+ <revised>2006-12-11: 01</revised>
<bug>152640</bug>
<access>remote</access>
<affected>
@@ -59,18 +58,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 10:04:50 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T10:04:50Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 23:29:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T23:29:14Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-12.xml b/glsa-200612-12.xml
index 0a854897..c63e5eba 100644
--- a/glsa-200612-12.xml
+++ b/glsa-200612-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-12">
<title>F-PROT Antivirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, possibly allowing the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">f-prot</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>157612</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/f-prot-4.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/f-prot-4.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6293">CVE-2006-6293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6294">CVE-2006-6294</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6352">CVE-2006-6352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6293">CVE-2006-6293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6294">CVE-2006-6294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6352">CVE-2006-6352</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Dec 2006 17:16:15 +0000">
+ <metadata tag="requester" timestamp="2006-12-11T17:16:15Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 20:51:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T20:51:14Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 23:24:00 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T23:24:00Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-13.xml b/glsa-200612-13.xml
index 968a6e1c..16b8e8e6 100644
--- a/glsa-200612-13.xml
+++ b/glsa-200612-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-13">
<title>libgsf: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">libgsf</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>156693</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/libgsf-1.14.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/libgsf-1.14.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514">CVE-2006-4514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514">CVE-2006-4514</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Dec 2006 19:48:29 +0000">
+ <metadata tag="requester" timestamp="2006-12-10T19:48:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 20:34:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T20:34:33Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:08:22 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:08:22Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200612-14.xml b/glsa-200612-14.xml
index 5fa3ea23..ef449fe4 100644
--- a/glsa-200612-14.xml
+++ b/glsa-200612-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-14">
<title>Trac: Cross-site request forgery</title>
<synopsis>
@@ -8,8 +7,8 @@
users.
</synopsis>
<product type="ebuild">trac</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>154574</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5848">CVE-2006-5848</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5878">CVE-2006-5878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5848">CVE-2006-5848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5878">CVE-2006-5878</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Dec 2006 06:01:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-06T06:01:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Dec 2006 10:06:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-07T10:06:43Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:17:55 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:17:55Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200612-15.xml b/glsa-200612-15.xml
index be70a54e..0c81a77e 100644
--- a/glsa-200612-15.xml
+++ b/glsa-200612-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-15">
<title>McAfee VirusScan: Insecure DT_RPATH</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">vlnx</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>156989</bug>
<access>remote</access>
<affected>
@@ -54,15 +53,15 @@
of this issue.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;app-antivirus/vlnx&quot;</code>
+ # emerge --ask --verbose --unmerge "app-antivirus/vlnx"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6474">CVE-2006-6474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6474">CVE-2006-6474</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:55:04 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:55:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 21:23:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T21:23:39Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-16.xml b/glsa-200612-16.xml
index 3942b68a..d025708b 100644
--- a/glsa-200612-16.xml
+++ b/glsa-200612-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-16">
<title>Links: Arbitrary Samba command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary Samba commands.
</synopsis>
<product type="ebuild">links</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>157028</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/links-2.1_pre26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/links-2.1_pre26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Dec 2006 21:05:34 +0000">
+ <metadata tag="requester" timestamp="2006-12-10T21:05:34Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Dec 2006 00:14:43 +0000">
+ <metadata tag="submitter" timestamp="2006-12-12T00:14:43Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Dec 2006 14:10:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-13T14:10:35Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200612-17.xml b/glsa-200612-17.xml
index 324f147e..c3ed1104 100644
--- a/glsa-200612-17.xml
+++ b/glsa-200612-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-17">
<title>GNU Radius: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">gnuradius</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>156376</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/gnuradius-1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/gnuradius-1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181">CVE-2006-4181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181">CVE-2006-4181</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Dec 2006 16:15:45 +0000">
+ <metadata tag="requester" timestamp="2006-12-11T16:15:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 20:51:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T20:51:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 22:14:11 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T22:14:11Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-18.xml b/glsa-200612-18.xml
index 25c7c378..1d59280d 100644
--- a/glsa-200612-18.xml
+++ b/glsa-200612-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-18">
<title>ClamAV: Denial of Service</title>
<synopsis>
ClamAV is vulnerable to Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 18, 2006</announced>
- <revised>December 18, 2006: 01</revised>
+ <announced>2006-12-18</announced>
+ <revised>2006-12-18: 01</revised>
<bug>157698</bug>
<access>remote</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481">CVE-2006-6481</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481">CVE-2006-6481</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 16 Dec 2006 18:27:28 +0000">
+ <metadata tag="submitter" timestamp="2006-12-16T18:27:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Dec 2006 19:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-18T19:01:42Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200612-19.xml b/glsa-200612-19.xml
index 7410ac1f..52331912 100644
--- a/glsa-200612-19.xml
+++ b/glsa-200612-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-19">
<title>pam_ldap: Authentication bypass vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
locked account to gain unauthorized system access.
</synopsis>
<product type="ebuild">pam_ldap</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>153916</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-183&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-183"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170">CVE-2006-5170</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170">CVE-2006-5170</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:57:27 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:57:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Dec 2006 16:58:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-19T16:58:04Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-20.xml b/glsa-200612-20.xml
index 2e50b689..ca43fdf9 100644
--- a/glsa-200612-20.xml
+++ b/glsa-200612-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-20">
<title>imlib2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>154216</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806">CVE-2006-4806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807">CVE-2006-4807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808">CVE-2006-4808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809">CVE-2006-4809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806">CVE-2006-4806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807">CVE-2006-4807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808">CVE-2006-4808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809">CVE-2006-4809</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Dec 2006 16:10:27 +0000">
+ <metadata tag="requester" timestamp="2006-12-15T16:10:27Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Dec 2006 20:15:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-18T20:15:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:42:29 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:42:29Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200612-21.xml b/glsa-200612-21.xml
index 04fc6daf..56d596a0 100644
--- a/glsa-200612-21.xml
+++ b/glsa-200612-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-21">
<title>Ruby: Denial of Service vulnerability</title>
<synopsis>
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>157048</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.5_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.5_p2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303">CVE-2006-6303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303">CVE-2006-6303</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:20:14 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:20:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Dec 2006 16:20:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-19T16:20:29Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-01.xml b/glsa-200701-01.xml
index 53a8444f..f521f99f 100644
--- a/glsa-200701-01.xml
+++ b/glsa-200701-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-01">
<title>DenyHosts: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service.
</synopsis>
<product type="ebuild">denyhosts</product>
- <announced>January 03, 2007</announced>
- <revised>January 03, 2007: 01</revised>
+ <announced>2007-01-03</announced>
+ <revised>2007-01-03: 01</revised>
<bug>157163</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/denyhosts-2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/denyhosts-2.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6301">CVE-2006-6301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6301">CVE-2006-6301</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Dec 2006 22:34:37 +0000">
+ <metadata tag="submitter" timestamp="2006-12-18T22:34:37Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 Jan 2007 14:18:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-01T14:18:29Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200701-02.xml b/glsa-200701-02.xml
index 7787acb7..e77eb83c 100644
--- a/glsa-200701-02.xml
+++ b/glsa-200701-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-02">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>January 04, 2007</announced>
- <revised>January 04, 2007: 01</revised>
+ <announced>2007-01-04</announced>
+ <revised>2007-01-04: 01</revised>
<bug>156023</bug>
<access>remote</access>
<affected>
@@ -58,31 +57,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.9"</code>
<p>
All Mozilla Firefox binary release users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 15:30:23 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T15:30:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Dec 2006 16:10:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-28T16:10:02Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-03.xml b/glsa-200701-03.xml
index 24c6bbdd..eccfceaf 100644
--- a/glsa-200701-03.xml
+++ b/glsa-200701-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-03">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>January 04, 2007</announced>
- <revised>January 04, 2007: 01</revised>
+ <announced>2007-01-04</announced>
+ <revised>2007-01-04: 01</revised>
<bug>158571</bug>
<access>remote</access>
<affected>
@@ -60,27 +59,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.9"</code>
<p>
All Mozilla Thunderbird binary release users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T15:51:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Dec 2006 16:10:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-28T16:10:06Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-04.xml b/glsa-200701-04.xml
index e19cfacb..53c7a2a2 100644
--- a/glsa-200701-04.xml
+++ b/glsa-200701-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-04">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>January 10, 2007</announced>
- <revised>January 10, 2007: 01</revised>
+ <announced>2007-01-10</announced>
+ <revised>2007-01-10: 01</revised>
<bug>158576</bug>
<access>remote</access>
<affected>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 16:02:48 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T16:02:48Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Jan 2007 21:26:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-10T21:26:08Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-05.xml b/glsa-200701-05.xml
index a80aabc9..ee004705 100644
--- a/glsa-200701-05.xml
+++ b/glsa-200701-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-05">
<title>KDE kfile JPEG info plugin: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to a Denial of Service.
</synopsis>
<product type="ebuild">kdegraphics-kfile-plugins</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>155949</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-kfile-plugins-3.5.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-kfile-plugins-3.5.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297">CVE-2006-6297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297">CVE-2006-6297</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Dec 2006 08:45:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-22T08:45:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 16:52:12 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T16:52:12Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 13:14:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T13:14:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-06.xml b/glsa-200701-06.xml
index bc4e8bd8..a9c6b335 100644
--- a/glsa-200701-06.xml
+++ b/glsa-200701-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-06">
<title>w3m: Format string vulnerability</title>
<synopsis>
w3m does not correctly handle format string specifiers in SSL certificates.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>159145</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/w3m-0.5.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/w3m-0.5.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772">CVE-2006-6772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772">CVE-2006-6772</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 11 Jan 2007 00:57:23 +0000">
+ <metadata tag="submitter" timestamp="2007-01-11T00:57:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Jan 2007 11:00:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-11T11:00:25Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200701-07.xml b/glsa-200701-07.xml
index 595afc7b..b4ac7a1f 100644
--- a/glsa-200701-07.xml
+++ b/glsa-200701-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-07">
<title>OpenOffice.org: EMF/WMF file handling vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenOffice.org could be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>159951</bug>
<access>remote</access>
<affected>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.1.0"</code>
<p>
All OpenOffice.org users should update to version 2.0.4 or later:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">CVE-2006-5870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">CVE-2006-5870</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Jan 2007 18:48:36 +0000">
+ <metadata tag="requester" timestamp="2007-01-09T18:48:36Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 19:06:14 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T19:06:14Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 12:16:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T12:16:11Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-08.xml b/glsa-200701-08.xml
index d2d7fa35..ea77310b 100644
--- a/glsa-200701-08.xml
+++ b/glsa-200701-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-08">
<title>Opera: Two remote code execution vulnerabilities</title>
<synopsis>
Two vulnerabilities may allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>160369</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.10"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=851">Opera Advisory (createSVGTransformFromMatrix)</uri>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=852">Opera Advisory (JPEG)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126">CVE-2007-0126</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127">CVE-2007-0127</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=851">Opera Advisory (createSVGTransformFromMatrix)</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=852">Opera Advisory (JPEG)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126">CVE-2007-0126</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127">CVE-2007-0127</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Jan 2007 12:37:33 +0000">
+ <metadata tag="requester" timestamp="2007-01-09T12:37:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 Jan 2007 12:37:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-09T12:37:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 18:43:10 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T18:43:10Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200701-09.xml b/glsa-200701-09.xml
index c3b12c69..8d8b0cb0 100644
--- a/glsa-200701-09.xml
+++ b/glsa-200701-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-09">
<title>oftpd: Denial of Service</title>
<synopsis>
An assertion in oftpd could lead to a denial of service vulnerability.
</synopsis>
<product type="ebuild">oftpd</product>
- <announced>January 15, 2007</announced>
- <revised>January 15, 2007: 01</revised>
+ <announced>2007-01-15</announced>
+ <revised>2007-01-15: 01</revised>
<bug>159178</bug>
<access>remote</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/oftpd-0.3.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/oftpd-0.3.7-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767">CVE-2006-6767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767">CVE-2006-6767</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 14 Jan 2007 22:33:02 +0000">
+ <metadata tag="submitter" timestamp="2007-01-14T22:33:02Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 23:05:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T23:05:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-10.xml b/glsa-200701-10.xml
index e9bec5eb..354f12b2 100644
--- a/glsa-200701-10.xml
+++ b/glsa-200701-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-10">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cross-site scripting attacks.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>January 15, 2007</announced>
- <revised>January 15, 2007: 01</revised>
+ <announced>2007-01-15</announced>
+ <revised>2007-01-15: 01</revised>
<bug>159229</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808">CVE-2006-6808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107">CVE-2007-0107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109">CVE-2007-0109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808">CVE-2006-6808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107">CVE-2007-0107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109">CVE-2007-0109</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Jan 2007 10:45:23 +0000">
+ <metadata tag="requester" timestamp="2007-01-08T10:45:23Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 13:32:54 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T13:32:54Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 13:12:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T13:12:39Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-11.xml b/glsa-200701-11.xml
index 7ac66a40..f28a03cd 100644
--- a/glsa-200701-11.xml
+++ b/glsa-200701-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-11">
<title>Kronolith: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">horde-kronolith</product>
- <announced>January 16, 2007</announced>
- <revised>January 16, 2007: 01</revised>
+ <announced>2007-01-16</announced>
+ <revised>2007-01-16: 01</revised>
<bug>156627</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-2.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6175">CVE-2006-6175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6175">CVE-2006-6175</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 17:58:37 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T17:58:37Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:17Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 12:41:09 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T12:41:09Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200701-12.xml b/glsa-200701-12.xml
index 2d884fa7..fdc6502d 100644
--- a/glsa-200701-12.xml
+++ b/glsa-200701-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-12">
<title>Mono: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">mono</product>
- <announced>January 16, 2007</announced>
- <revised>January 17, 2007: 02</revised>
+ <announced>2007-01-16</announced>
+ <revised>2007-01-17: 02</revised>
<bug>159886</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104">CVE-2006-6104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104">CVE-2006-6104</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:42:16 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T18:42:16Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:13Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:17:42 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:17:42Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-13.xml b/glsa-200701-13.xml
index cefa876c..c32954ef 100644
--- a/glsa-200701-13.xml
+++ b/glsa-200701-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-13">
<title>Fetchmail: Denial of Service and password disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and password disclosure.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>January 22, 2007</announced>
- <revised>January 22, 2007: 01</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-01-22: 01</revised>
<bug>160463</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Jan 2007 23:33:39 +0000">
+ <metadata tag="requester" timestamp="2007-01-15T23:33:39Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Jan 2007 17:08:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-16T17:08:58Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:05:45 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:05:45Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-14.xml b/glsa-200701-14.xml
index b16067e1..017dd140 100644
--- a/glsa-200701-14.xml
+++ b/glsa-200701-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-14">
<title>Mod_auth_kerb: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">mod_auth_kerb</product>
- <announced>January 22, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-12-30: 02</revised>
<bug>155782</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_auth_kerb-5.0_rc7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_auth_kerb-5.0_rc7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989">CVE-2006-5989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989">CVE-2006-5989</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:33:24 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:33:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:40:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:40:53Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 01:47:32 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T01:47:32Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-15.xml b/glsa-200701-15.xml
index 79cda4f9..44f33ea7 100644
--- a/glsa-200701-15.xml
+++ b/glsa-200701-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-15">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Development Kit (JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">java</product>
- <announced>January 22, 2007</announced>
- <revised>July 16, 2008: 04</revised>
+ <announced>2007-01-22</announced>
+ <revised>2008-07-16: 04</revised>
<bug>158659</bug>
<access>remote</access>
<affected>
@@ -70,28 +69,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jdk&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jdk"</code>
<p>
All Sun Java Runtime Environment users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jre-bin&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:36:56 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:36:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 01:12:01 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T01:12:01Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-16.xml b/glsa-200701-16.xml
index 176c0620..7fff3d34 100644
--- a/glsa-200701-16.xml
+++ b/glsa-200701-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-16">
<title>Adobe Acrobat Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, and cross-site scripting attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 22, 2007</announced>
- <revised>January 22, 2007: 01</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-01-22: 01</revised>
<bug>159874</bug>
<access>remote</access>
<affected>
@@ -63,22 +62,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857">CVE-2006-5857</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044">CVE-2007-0044</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046">CVE-2007-0046</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857">CVE-2006-5857</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044">CVE-2007-0044</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046">CVE-2007-0046</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 12:10:48 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T12:10:48Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:45:48 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:45:48Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:38:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:38:29Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-17.xml b/glsa-200701-17.xml
index fde634f0..c7ae6740 100644
--- a/glsa-200701-17.xml
+++ b/glsa-200701-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-17">
<title>libgtop: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">libgtop</product>
- <announced>January 23, 2007</announced>
- <revised>January 23, 2007: 01</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-01-23: 01</revised>
<bug>162169</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-base/libgtop-2.14.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-base/libgtop-2.14.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235">CVE-2007-0235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235">CVE-2007-0235</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:40:30 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:40:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 17:24:28 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T17:24:28Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:14:40Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-18.xml b/glsa-200701-18.xml
index 6ae5af2a..e0e50f21 100644
--- a/glsa-200701-18.xml
+++ b/glsa-200701-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-18">
<title>xine-ui: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-ui</product>
- <announced>January 23, 2007</announced>
- <revised>January 23, 2007: 01</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-01-23: 01</revised>
<bug>161558</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/xine-ui-0.99.5_pre20060716&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/xine-ui-0.99.5_pre20060716"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0254">CVE-2007-0254</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0254">CVE-2007-0254</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:36:36 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:36:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:40:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:40:52Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 01:55:17 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T01:55:17Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-19.xml b/glsa-200701-19.xml
index 2bb074f4..ad4c79db 100644
--- a/glsa-200701-19.xml
+++ b/glsa-200701-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-19">
<title>OpenLDAP: Insecure usage of /tmp during installation</title>
<synopsis>
@@ -8,8 +7,8 @@
files in /tmp during the emerge process.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>January 23, 2007</announced>
- <revised>March 11, 2007: 02</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-03-11: 02</revised>
<bug>159508</bug>
<access>local</access>
<affected>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-nds/openldap&quot;</code>
+ # emerge --ask --oneshot --verbose "net-nds/openldap"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0476">CVE-2007-0476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0476">CVE-2007-0476</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Jan 2007 21:20:49 +0000">
+ <metadata tag="requester" timestamp="2007-01-13T21:20:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:28:23 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:28:23Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-20.xml b/glsa-200701-20.xml
index a5200daa..913cffa4 100644
--- a/glsa-200701-20.xml
+++ b/glsa-200701-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-20">
<title>Centericq: Remote buffer overflow in LiveJournal handling</title>
<synopsis>
@@ -8,8 +7,8 @@
service, allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">centericq</product>
- <announced>January 24, 2007</announced>
- <revised>January 24, 2007: 01</revised>
+ <announced>2007-01-24</announced>
+ <revised>2007-01-24: 01</revised>
<bug>160793</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
masked in Portage until it is again maintained.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;net-im/centericq&quot;</code>
+ # emerge --ask --verbose --unmerge "net-im/centericq"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:03:01 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T18:03:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:11Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:19:00 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:19:00Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-21.xml b/glsa-200701-21.xml
index 90290f4f..43352a71 100644
--- a/glsa-200701-21.xml
+++ b/glsa-200701-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-21">
<title>MIT Kerberos 5: Arbitrary Remote Code Execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 24, 2007</announced>
- <revised>January 24, 2007: 01</revised>
+ <announced>2007-01-24</announced>
+ <revised>2007-01-24: 01</revised>
<bug>158810</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143">CVE-2006-6143</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144">CVE-2006-6144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143">CVE-2006-6143</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144">CVE-2006-6144</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:46:59 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:46:59Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Jan 2007 23:13:19 +0000">
+ <metadata tag="submitter" timestamp="2007-01-14T23:13:19Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:38:46Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-22.xml b/glsa-200701-22.xml
index e4a019ed..3c51d557 100644
--- a/glsa-200701-22.xml
+++ b/glsa-200701-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-22">
<title>Squid: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attacks.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 25, 2007</announced>
- <revised>January 25, 2007: 01</revised>
+ <announced>2007-01-25</announced>
+ <revised>2007-01-25: 01</revised>
<bug>162364</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247">CVE-2007-0247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248">CVE-2007-0248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247">CVE-2007-0247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248">CVE-2007-0248</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Jan 2007 16:59:17 +0000">
+ <metadata tag="requester" timestamp="2007-01-22T16:59:17Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Jan 2007 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2007-01-23T10:26:06Z">
hyakuhei
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 12:52:50 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T12:52:50Z">
hyakuhei
</metadata>
</glsa>
diff --git a/glsa-200701-23.xml b/glsa-200701-23.xml
index d0726210..6f9f4c8b 100644
--- a/glsa-200701-23.xml
+++ b/glsa-200701-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-23">
<title>Cacti: Command execution and SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL injection.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>January 26, 2007</announced>
- <revised>January 26, 2007: 01</revised>
+ <announced>2007-01-26</announced>
+ <revised>2007-01-26: 01</revised>
<bug>159278</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6i-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6i-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6799">CVE-2006-6799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6799">CVE-2006-6799</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:58:24 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:58:24Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 Jan 2007 02:39:11 +0000">
+ <metadata tag="submitter" timestamp="2007-01-16T02:39:11Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:17:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:17:59Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-24.xml b/glsa-200701-24.xml
index 40e12901..7c38a55c 100644
--- a/glsa-200701-24.xml
+++ b/glsa-200701-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-24">
<title>VLC media player: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>January 26, 2007</announced>
- <revised>January 26, 2007: 01</revised>
+ <announced>2007-01-26</announced>
+ <revised>2007-01-26: 01</revised>
<bug>159845</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017">CVE-2007-0017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017">CVE-2007-0017</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Jan 2007 23:30:46 +0000">
+ <metadata tag="requester" timestamp="2007-01-15T23:30:46Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Jan 2007 17:08:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-16T17:08:55Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:10:51 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:10:51Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200701-25.xml b/glsa-200701-25.xml
index ea11b69f..00717670 100644
--- a/glsa-200701-25.xml
+++ b/glsa-200701-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-25">
<title>X.Org X server: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
DBE and Render extensions.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>January 27, 2007</announced>
- <revised>February 26, 2007: 02</revised>
+ <announced>2007-01-27</announced>
+ <revised>2007-02-26: 02</revised>
<bug>157421</bug>
<access>local</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.1.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.1.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101">CVE-2006-6101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102">CVE-2006-6102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103">CVE-2006-6103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101">CVE-2006-6101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102">CVE-2006-6102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103">CVE-2006-6103</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 23 Jan 2007 12:31:17 +0000">
+ <metadata tag="submitter" timestamp="2007-01-23T12:31:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 15:54:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T15:54:52Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200701-26.xml b/glsa-200701-26.xml
index 9065e78d..54784396 100644
--- a/glsa-200701-26.xml
+++ b/glsa-200701-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-26">
<title>KSirc: Denial of Service vulnerability</title>
<synopsis>
KSirc is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ksirc</product>
- <announced>January 29, 2007</announced>
- <revised>January 30, 2007: 01</revised>
+ <announced>2007-01-29</announced>
+ <revised>2007-01-30: 01</revised>
<bug>159658</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/ksirc-3.5.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/ksirc-3.5.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6811">CVE-2006-6811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6811">CVE-2006-6811</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jan 2007 20:03:08 +0000">
+ <metadata tag="requester" timestamp="2007-01-24T20:03:08Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 20:03:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T20:03:22Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Jan 2007 11:44:16 +0000">
+ <metadata tag="submitter" timestamp="2007-01-25T11:44:16Z">
hyakuhei
</metadata>
</glsa>
diff --git a/glsa-200701-27.xml b/glsa-200701-27.xml
index 952ae298..e4ecbad1 100644
--- a/glsa-200701-27.xml
+++ b/glsa-200701-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-27">
<title>ELinks: Arbitrary Samba command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary Samba commands.
</synopsis>
<product type="ebuild">elinks</product>
- <announced>January 30, 2007</announced>
- <revised>January 30, 2007: 01</revised>
+ <announced>2007-01-30</announced>
+ <revised>2007-01-30: 01</revised>
<bug>155358</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/elinks-0.11.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/elinks-0.11.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 30 Jan 2007 10:52:21 +0000">
+ <metadata tag="submitter" timestamp="2007-01-30T10:52:21Z">
hyakuhei
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 30 Jan 2007 11:02:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-30T11:02:26Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200701-28.xml b/glsa-200701-28.xml
index 76ed830e..e984df56 100644
--- a/glsa-200701-28.xml
+++ b/glsa-200701-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-28">
<title>thttpd: Unauthenticated remote file access</title>
<synopsis>
@@ -9,8 +8,8 @@
baselayout.
</synopsis>
<product type="ebuild">thttpd</product>
- <announced>January 31, 2007</announced>
- <revised>March 11, 2007: 02</revised>
+ <announced>2007-01-31</announced>
+ <revised>2007-03-11: 02</revised>
<bug>142047</bug>
<access>remote</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/thttpd-2.25b-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/thttpd-2.25b-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0664">CVE-2007-0664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0664">CVE-2007-0664</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Jan 2007 12:41:44 +0000">
+ <metadata tag="requester" timestamp="2007-01-26T12:41:44Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Jan 2007 17:49:26 +0000">
+ <metadata tag="submitter" timestamp="2007-01-27T17:49:26Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Jan 2007 21:45:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-31T21:45:13Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-01.xml b/glsa-200702-01.xml
index 10c116ac..c187c534 100644
--- a/glsa-200702-01.xml
+++ b/glsa-200702-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-01">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>165549</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.24"</code>
</resolution>
<references>
- <uri link="http://samba.org/samba/security/CVE-2007-0452.html">CVE-2007-0452</uri>
- <uri link="http://samba.org/samba/security/CVE-2007-0454.html">CVE-2007-0454</uri>
+ <uri link="https://samba.org/samba/security/CVE-2007-0452.html">CVE-2007-0452</uri>
+ <uri link="https://samba.org/samba/security/CVE-2007-0454.html">CVE-2007-0454</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Feb 2007 15:08:23 +0000">
+ <metadata tag="requester" timestamp="2007-02-09T15:08:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:21:02 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:21:02Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200702-02.xml b/glsa-200702-02.xml
index 7761eb2d..0912b906 100644
--- a/glsa-200702-02.xml
+++ b/glsa-200702-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-02">
<title>ProFTPD: Local privilege escalation</title>
<synopsis>
A flaw in ProFTPD may allow a local attacker to obtain root privileges.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>158122</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563">CVE-2006-6563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563">CVE-2006-6563</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:05:16 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:05:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:07:04 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:07:04Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200702-03.xml b/glsa-200702-03.xml
index 40d0c6b0..d6f91c8e 100644
--- a/glsa-200702-03.xml
+++ b/glsa-200702-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-03">
<title>Snort: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
result in a Denial of Service.
</synopsis>
<product type="ebuild">snort</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>161632</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/snort-2.6.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/snort-2.6.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6931">CVE-2006-6931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6931">CVE-2006-6931</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:01:49 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:01:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:41:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:41:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:29:42 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:29:42Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-04.xml b/glsa-200702-04.xml
index c72da64f..cab68045 100644
--- a/glsa-200702-04.xml
+++ b/glsa-200702-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-04">
<title>RAR, UnRAR: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">rar, unrar</product>
- <announced>February 13, 2007</announced>
- <revised>February 14, 2007: 02</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-14: 02</revised>
<bug>166440</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unrar-3.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unrar-3.7.3"</code>
<p>
All RAR users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rar-3.7.0_beta1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rar-3.7.0_beta1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855">CVE-2007-0855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855">CVE-2007-0855</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 15:25:34 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T15:25:34Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:14:14 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:14:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Feb 2007 23:24:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-13T23:24:39Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-05.xml b/glsa-200702-05.xml
index e290a86c..a9602cfb 100644
--- a/glsa-200702-05.xml
+++ b/glsa-200702-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-05">
<title>Fail2ban: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
hosts.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>February 16, 2007</announced>
- <revised>February 16, 2007: 01</revised>
+ <announced>2007-02-16</announced>
+ <revised>2007-02-16: 01</revised>
<bug>157166</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/fail2ban-0.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/fail2ban-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6302">CVE-2006-6302</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6302">CVE-2006-6302</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:35:11 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:35:11Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 22:56:35 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T22:56:35Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200702-06.xml b/glsa-200702-06.xml
index e553c885..bd540b89 100644
--- a/glsa-200702-06.xml
+++ b/glsa-200702-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-06">
<title>BIND: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certain conditions.
</synopsis>
<product type="ebuild">bind</product>
- <announced>February 17, 2007</announced>
- <revised>February 17, 2007: 01</revised>
+ <announced>2007-02-17</announced>
+ <revised>2007-02-17: 01</revised>
<bug>163692</bug>
<access>remote</access>
<affected>
@@ -54,25 +53,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.3.4"</code>
<p>
All ISC BIND 9.2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493">CVE-2007-0493</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494">CVE-2007-0494</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493">CVE-2007-0493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494">CVE-2007-0494</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 16 Feb 2007 09:07:21 +0000">
+ <metadata tag="requester" timestamp="2007-02-16T09:07:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Feb 2007 17:39:52 +0000">
+ <metadata tag="submitter" timestamp="2007-02-16T17:39:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Feb 2007 15:53:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-17T15:53:00Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-07.xml b/glsa-200702-07.xml
index 650f83bf..28332646 100644
--- a/glsa-200702-07.xml
+++ b/glsa-200702-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-07">
<title>Sun JDK/JRE: Execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
potentially leading to the execute of arbitrary code.
</synopsis>
<product type="ebuild">java</product>
- <announced>February 17, 2007</announced>
- <revised>July 16, 2008: 05</revised>
+ <announced>2007-02-17</announced>
+ <revised>2008-07-16: 05</revised>
<bug>162511</bug>
<access>remote</access>
<affected>
@@ -68,39 +67,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.10"</code>
<p>
All Sun Java Development Kit 1.4 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-java/sun-jdk-1.4.2*&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"</code>
<p>
All Sun Java Runtime Environment 1.5 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.10"</code>
<p>
All Sun Java Runtime Environment 1.4 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-java/sun-jre-bin-1.4.2*&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:27:14 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:27:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:12Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:55:24 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:55:24Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-08.xml b/glsa-200702-08.xml
index ae70db05..02320aca 100644
--- a/glsa-200702-08.xml
+++ b/glsa-200702-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-08">
<title>AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Development Kit (JDK) and Sun Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">java</product>
- <announced>February 17, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-02-17</announced>
+ <revised>2009-05-28: 02</revised>
<bug>159547</bug>
<access>remote</access>
<affected>
@@ -60,22 +59,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:34:40 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:34:40Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 22:57:40 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T22:57:40Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-09.xml b/glsa-200702-09.xml
index 85d8ceae..dbf7e920 100644
--- a/glsa-200702-09.xml
+++ b/glsa-200702-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-09">
<title>Nexuiz: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">nexuiz</product>
- <announced>February 25, 2007</announced>
- <revised>February 25, 2007: 01</revised>
+ <announced>2007-02-25</announced>
+ <revised>2007-02-25: 01</revised>
<bug>166044</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/nexuiz-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/nexuiz-2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6609">CVE-2006-6609</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6610">CVE-2006-6610</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6609">CVE-2006-6609</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6610">CVE-2006-6610</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 22:20:41 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T22:20:41Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 Feb 2007 16:20:20 +0000">
+ <metadata tag="submitter" timestamp="2007-02-15T16:20:20Z">
hyakuhei
</metadata>
</glsa>
diff --git a/glsa-200702-10.xml b/glsa-200702-10.xml
index 24088f4f..bd3707a0 100644
--- a/glsa-200702-10.xml
+++ b/glsa-200702-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-10">
<title>UFO2000: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
UFO2000 that could result in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ufo2000</product>
- <announced>February 25, 2007</announced>
- <revised>February 25, 2007: 01</revised>
+ <announced>2007-02-25</announced>
+ <revised>2007-02-25: 01</revised>
<bug>142392</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
# emerge --ask --verbose --unmerge ufo2000</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788">CVE-2006-3788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789">CVE-2006-3789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790">CVE-2006-3790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791">CVE-2006-3791</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792">CVE-2006-3792</uri>
- <uri link="/security/en/glsa/glsa-200608-14.xml">GLSA 200608-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788">CVE-2006-3788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789">CVE-2006-3789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790">CVE-2006-3790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791">CVE-2006-3791</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792">CVE-2006-3792</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-14.xml">GLSA 200608-14</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:42:06 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:42:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Feb 2007 03:39:23 +0000">
+ <metadata tag="submitter" timestamp="2007-02-14T03:39:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Feb 2007 21:24:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-19T21:24:04Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-11.xml b/glsa-200702-11.xml
index 8a507823..48be9669 100644
--- a/glsa-200702-11.xml
+++ b/glsa-200702-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-11">
<title>MPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or arbitrary code execution.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>February 27, 2007</announced>
- <revised>February 27, 2007: 01</revised>
+ <announced>2007-02-27</announced>
+ <revised>2007-02-27: 01</revised>
<bug>159727</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc1-r2"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/design7/news.html#vuln14">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 12:10:45 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T12:10:45Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Feb 2007 11:54:03 +0000">
+ <metadata tag="submitter" timestamp="2007-02-13T11:54:03Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Feb 2007 12:06:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-13T12:06:52Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200702-12.xml b/glsa-200702-12.xml
index eb0cf915..577026d4 100644
--- a/glsa-200702-12.xml
+++ b/glsa-200702-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-12">
<title>CHMlib: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">CHMlib</product>
- <announced>February 27, 2007</announced>
- <revised>May 20, 2008: 02</revised>
+ <announced>2007-02-27</announced>
+ <revised>2008-05-20: 02</revised>
<bug>163989</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/chmlib-0.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/chmlib-0.39"</code>
</resolution>
<references>
<uri link="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=468">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619">CVE-2007-0619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619">CVE-2007-0619</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 21:22:08 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T21:22:08Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Feb 2007 11:35:38 +0000">
+ <metadata tag="submitter" timestamp="2007-02-13T11:35:38Z">
daxomatic
</metadata>
</glsa>
diff --git a/glsa-200703-01.xml b/glsa-200703-01.xml
index 259fa6a3..716db100 100644
--- a/glsa-200703-01.xml
+++ b/glsa-200703-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-01">
<title>Snort: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">snort</product>
- <announced>February 23, 2007</announced>
- <revised>March 02, 2007: 02</revised>
+ <announced>2007-02-23</announced>
+ <revised>2007-03-02: 02</revised>
<bug>167730</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/snort-2.6.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/snort-2.6.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276">CVE-2006-5276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276">CVE-2006-5276</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:25:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:25:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 18:06:20 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T18:06:20Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-02.xml b/glsa-200703-02.xml
index e16ab46c..4cc3b9da 100644
--- a/glsa-200703-02.xml
+++ b/glsa-200703-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-02">
<title>SpamAssassin: Long URI Denial of Service</title>
<synopsis>
SpamAssassin is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">spamassassin</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>166969</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451">CVE-2007-0451</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451">CVE-2007-0451</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Feb 2007 19:43:02 +0000">
+ <metadata tag="requester" timestamp="2007-02-25T19:43:02Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 25 Feb 2007 19:46:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-25T19:46:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Feb 2007 18:49:30 +0000">
+ <metadata tag="submitter" timestamp="2007-02-26T18:49:30Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200703-03.xml b/glsa-200703-03.xml
index 6a0931c2..f28cd464 100644
--- a/glsa-200703-03.xml
+++ b/glsa-200703-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-03">
<title>ClamAV: Denial of Service</title>
<synopsis>
ClamAV contains two vulnerabilities allowing a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>167201</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897">CVE-2007-0897</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898">CVE-2007-0898</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897">CVE-2007-0897</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898">CVE-2007-0898</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Feb 2007 22:43:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-26T22:43:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 13:49:10 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T13:49:10Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 02 Mar 2007 00:24:54 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-02T00:24:54Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-04.xml b/glsa-200703-04.xml
index 5648cd19..88639718 100644
--- a/glsa-200703-04.xml
+++ b/glsa-200703-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-04">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -70,49 +69,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.10"</code>
<p>
All Mozilla Firefox 1.5 binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.10"</code>
<p>
All Mozilla Firefox 2.0 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.2"</code>
<p>
All Mozilla Firefox 2.0 binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366">Mozilla password loss bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Feb 2007 18:38:44 +0000">
+ <metadata tag="requester" timestamp="2007-02-27T18:38:44Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Mar 2007 15:14:03 +0000">
+ <metadata tag="submitter" timestamp="2007-03-01T15:14:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Mar 2007 15:15:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-01T15:15:57Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-05.xml b/glsa-200703-05.xml
index 893ee2a4..4a8f4aa9 100644
--- a/glsa-200703-05.xml
+++ b/glsa-200703-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-05">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
supported by the Mozilla project.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>March 03, 2007</announced>
- <revised>March 03, 2007: 01</revised>
+ <announced>2007-03-03</announced>
+ <revised>2007-03-03: 01</revised>
<bug>135257</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
- # emerge --unmerge &quot;www-client/mozilla&quot;
+ # emerge --unmerge "www-client/mozilla"
- # emerge --unmerge &quot;www-client/mozilla-bin&quot;</code>
+ # emerge --unmerge "www-client/mozilla-bin"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Official Advisory</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Official Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:38:03 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:38:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 15:55:16 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T15:55:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 15:58:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T15:58:20Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-06.xml b/glsa-200703-06.xml
index acc96021..f3bc5dd9 100644
--- a/glsa-200703-06.xml
+++ b/glsa-200703-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-06">
<title>AMD64 x86 emulation Qt library: Integer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">emul-linux-x86-qtlibs</product>
- <announced>March 04, 2007</announced>
- <revised>March 04, 2007: 01</revised>
+ <announced>2007-03-04</announced>
+ <revised>2007-03-04: 01</revised>
<bug>153704</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-qtlibs-10.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-qtlibs-10.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200611-02.xml">GLSA 200611-02</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-02.xml">GLSA 200611-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Feb 2007 23:37:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-17T23:37:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Feb 2007 00:18:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-18T00:18:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 16:14:33 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T16:14:33Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200703-07.xml b/glsa-200703-07.xml
index 8c4865b8..4be5fbfd 100644
--- a/glsa-200703-07.xml
+++ b/glsa-200703-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-07">
<title>STLport: Possible remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">STLport</product>
- <announced>March 06, 2007</announced>
- <revised>March 06, 2007: 01</revised>
+ <announced>2007-03-06</announced>
+ <revised>2007-03-06: 01</revised>
<bug>165837</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/STLport-5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/STLport-5.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0803">CVE-2007-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0803">CVE-2007-0803</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 07:45:45 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T07:45:45Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Feb 2007 12:07:38 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-18T12:07:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Feb 2007 22:45:11 +0000">
+ <metadata tag="submitter" timestamp="2007-02-18T22:45:11Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200703-08.xml b/glsa-200703-08.xml
index 31246a8f..2ad5cd13 100644
--- a/glsa-200703-08.xml
+++ b/glsa-200703-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-08">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>March 09, 2007</announced>
- <revised>March 09, 2007: 01</revised>
+ <announced>2007-03-09</announced>
+ <revised>2007-03-09: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -73,32 +72,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.1"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366">Mozilla Password Loss Bug</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 04 Mar 2007 00:05:48 +0000">
+ <metadata tag="submitter" timestamp="2007-03-04T00:05:48Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 09 Mar 2007 22:48:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-09T22:48:00Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-09.xml b/glsa-200703-09.xml
index 8fcb7547..aa51e1a3 100644
--- a/glsa-200703-09.xml
+++ b/glsa-200703-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-09">
<title>Smb4K: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in Smb4K.
</synopsis>
<product type="ebuild">smb4k</product>
- <announced>March 09, 2007</announced>
- <revised>March 09, 2007: 01</revised>
+ <announced>2007-03-09</announced>
+ <revised>2007-03-09: 01</revised>
<bug>156152</bug>
<access>local</access>
<affected>
@@ -62,21 +61,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/smb4k-0.6.10a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/smb4k-0.6.10a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472">CVE-2007-0472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473">CVE-2007-0473</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474">CVE-2007-0474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475">CVE-2007-0475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472">CVE-2007-0472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473">CVE-2007-0473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474">CVE-2007-0474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475">CVE-2007-0475</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:36:28 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:36:28Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 15:26:26 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T15:26:26Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200703-10.xml b/glsa-200703-10.xml
index 8dbeedea..16cccd0b 100644
--- a/glsa-200703-10.xml
+++ b/glsa-200703-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-10">
<title>KHTML: Cross-site scripting (XSS) vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
scripting (XSS) vulnerability.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>March 10, 2007</announced>
- <revised>March 10, 2007: 01</revised>
+ <announced>2007-03-10</announced>
+ <revised>2007-03-10: 01</revised>
<bug>165606</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.5.5-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.5-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537">CVE-2007-0537</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478">CVE-2007-0478</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537">CVE-2007-0537</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478">CVE-2007-0478</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 16:04:07 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T16:04:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 16:19:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T16:19:36Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-11.xml b/glsa-200703-11.xml
index 3d44e40c..54626571 100644
--- a/glsa-200703-11.xml
+++ b/glsa-200703-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-11">
<title>Amarok: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary shell code from a malicious Magnatune server.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>March 13, 2007</announced>
- <revised>March 13, 2007: 01</revised>
+ <announced>2007-03-13</announced>
+ <revised>2007-03-13: 01</revised>
<bug>166901</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.5-r1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/24159">SA24159</uri>
+ <uri link="https://secunia.com/advisories/24159">SA24159</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:45:23 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:45:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 13:56:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T13:56:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 14:11:31 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T14:11:31Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-12.xml b/glsa-200703-12.xml
index 570e7bd0..74d14bbf 100644
--- a/glsa-200703-12.xml
+++ b/glsa-200703-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-12">
<title>SILC Server: Denial of Service</title>
<synopsis>
SILC Server is affected by a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">silc-server</product>
- <announced>March 14, 2007</announced>
- <revised>March 14, 2007: 01</revised>
+ <announced>2007-03-14</announced>
+ <revised>2007-03-14: 01</revised>
<bug>169599</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-server-1.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-server-1.0.2-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Wed, 07 Mar 2007 14:35:02 +0000">
+ <metadata tag="requester" timestamp="2007-03-07T14:35:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Mar 2007 14:57:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-07T14:57:46Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Mar 2007 15:20:03 +0000">
+ <metadata tag="submitter" timestamp="2007-03-07T15:20:03Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200703-13.xml b/glsa-200703-13.xml
index 3258a263..c384ed34 100644
--- a/glsa-200703-13.xml
+++ b/glsa-200703-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-13">
<title>SSH Communications Security's Secure Shell Server: SFTP privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">net-misc/ssh</product>
- <announced>March 14, 2007</announced>
- <revised>March 14, 2007: 01</revised>
+ <announced>2007-03-14</announced>
+ <revised>2007-03-14: 01</revised>
<bug>168584</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --verbose --unmerge net-misc/ssh</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0705">CVE-2006-0705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0705">CVE-2006-0705</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Mar 2007 21:03:07 +0000">
+ <metadata tag="requester" timestamp="2007-03-05T21:03:07Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Mar 2007 14:57:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-07T14:57:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Mar 2007 13:16:30 +0000">
+ <metadata tag="submitter" timestamp="2007-03-09T13:16:30Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200703-14.xml b/glsa-200703-14.xml
index 6a97a515..2f5003cb 100644
--- a/glsa-200703-14.xml
+++ b/glsa-200703-14.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-14">
<title>Asterisk: SIP Denial of Service</title>
<synopsis>
Asterisk is vulnerable to Denial of Service in the SIP channel.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>March 16, 2007</announced>
- <revised>March 16, 2007: 01</revised>
+ <announced>2007-03-16</announced>
+ <revised>2007-03-16: 01</revised>
<bug>169616</bug>
<access>remote</access>
<affected>
@@ -55,13 +54,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306">CVE-2007-1306</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306">CVE-2007-1306</uri>
<uri link="http://labs.musecurity.com/advisories/MU-200703-01.txt">MU-200703-01</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 07:59:58 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T07:59:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 10:36:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T10:36:56Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-15.xml b/glsa-200703-15.xml
index cdd51706..10fb3966 100644
--- a/glsa-200703-15.xml
+++ b/glsa-200703-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-15">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service or unauthorized access to certain information.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>March 16, 2007</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2007-03-16</announced>
+ <revised>2009-05-28: 04</revised>
<bug>165482</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Mar 2007 22:33:46 +0000">
+ <metadata tag="requester" timestamp="2007-03-09T22:33:46Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Mar 2007 16:09:31 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-12T16:09:31Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 19:55:02 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T19:55:02Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-16.xml b/glsa-200703-16.xml
index 7a49706b..90f12712 100644
--- a/glsa-200703-16.xml
+++ b/glsa-200703-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-16">
<title>Apache JK Tomcat Connector: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability that could result in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>March 16, 2007</announced>
- <revised>March 16, 2007: 01</revised>
+ <announced>2007-03-16</announced>
+ <revised>2007-03-16: 01</revised>
<bug>169433</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.21-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.21-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774">CVE-2007-0774</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774">CVE-2007-0774</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2007 16:08:28 +0000">
+ <metadata tag="requester" timestamp="2007-03-06T16:08:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Mar 2007 00:11:00 +0000">
+ <metadata tag="submitter" timestamp="2007-03-14T00:11:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Mar 2007 20:16:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-14T20:16:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200703-17.xml b/glsa-200703-17.xml
index 0b8725c8..ee75cc87 100644
--- a/glsa-200703-17.xml
+++ b/glsa-200703-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-17">
<title>ulogd: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ulogd</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>161882</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/ulogd-1.23-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/ulogd-1.23-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460">CVE-2007-0460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460">CVE-2007-0460</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 07:34:19 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T07:34:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 12:57:18 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T12:57:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Mar 2007 21:32:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-18T21:32:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-18.xml b/glsa-200703-18.xml
index b3019faa..bbf45760 100644
--- a/glsa-200703-18.xml
+++ b/glsa-200703-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-18">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -60,27 +59,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.10"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1282">CVE-2007-1282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1282">CVE-2007-1282</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 23:29:16 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T23:29:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Mar 2007 00:11:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-14T00:11:26Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-19.xml b/glsa-200703-19.xml
index 9a20d039..085b8f73 100644
--- a/glsa-200703-19.xml
+++ b/glsa-200703-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-19">
<title>LTSP: Authentication bypass in included LibVNCServer code</title>
<synopsis>
@@ -8,8 +7,8 @@
authentication bypass.
</synopsis>
<product type="ebuild">ltsp</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>142661</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ltsp-4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ltsp-4.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
- <uri link="/security/en/glsa/glsa-200608-05.xml">GLSA 200608-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-05.xml">GLSA 200608-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:11:34 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:11:34Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:14Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 02:25:26 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T02:25:26Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200703-20.xml b/glsa-200703-20.xml
index 9687dba3..c6524b80 100644
--- a/glsa-200703-20.xml
+++ b/glsa-200703-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-20">
<title>LSAT: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">lsat</product>
- <announced>March 18, 2007</announced>
- <revised>May 11, 2007: 02</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-05-11: 02</revised>
<bug>159542</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/lsat-0.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/lsat-0.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1500">CVE-2007-1500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1500">CVE-2007-1500</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Mar 2007 22:15:51 +0000">
+ <metadata tag="requester" timestamp="2007-03-15T22:15:51Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 10:34:49 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T10:34:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:42:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:42:45Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200703-21.xml b/glsa-200703-21.xml
index 3c705e59..1606a448 100644
--- a/glsa-200703-21.xml
+++ b/glsa-200703-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-21">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
conditions.
</synopsis>
<product type="ebuild">php</product>
- <announced>March 20, 2007</announced>
- <revised>March 29, 2008: 03</revised>
+ <announced>2007-03-20</announced>
+ <revised>2008-03-29: 03</revised>
<bug>153911</bug>
<access>remote</access>
<affected>
@@ -60,32 +59,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-lang/php&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-lang/php"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465">CVE-2006-5465</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906">CVE-2007-0906</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907">CVE-2007-0907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908">CVE-2007-0908</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909">CVE-2007-0909</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910">CVE-2007-0910</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911">CVE-2007-0911</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988">CVE-2007-0988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375">CVE-2007-1375</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376">CVE-2007-1376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380">CVE-2007-1380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383">CVE-2007-1383</uri>
- <uri link="http://www.php.net/releases/4_4_5.php">PHP 4.4.5 Release Announcement</uri>
- <uri link="http://www.php.net/releases/5_2_1.php">PHP 5.2.1 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465">CVE-2006-5465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906">CVE-2007-0906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907">CVE-2007-0907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908">CVE-2007-0908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909">CVE-2007-0909</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910">CVE-2007-0910</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911">CVE-2007-0911</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988">CVE-2007-0988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375">CVE-2007-1375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376">CVE-2007-1376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380">CVE-2007-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383">CVE-2007-1383</uri>
+ <uri link="https://www.php.net/releases/4_4_5.php">PHP 4.4.5 Release Announcement</uri>
+ <uri link="https://www.php.net/releases/5_2_1.php">PHP 5.2.1 Release Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 13:36:33 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T13:36:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 10:54:22 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T10:54:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:47:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:47:58Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200703-22.xml b/glsa-200703-22.xml
index c3f02afe..4ce282f0 100644
--- a/glsa-200703-22.xml
+++ b/glsa-200703-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-22">
<title>Mozilla Network Security Service: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">nss</product>
- <announced>March 20, 2007</announced>
- <revised>March 20, 2007: 01</revised>
+ <announced>2007-03-20</announced>
+ <revised>2007-03-20: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/nss-3.11.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/nss-3.11.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 23:41:07 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T23:41:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:51:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:51:35Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200703-23.xml b/glsa-200703-23.xml
index a2c87f48..652fa154 100644
--- a/glsa-200703-23.xml
+++ b/glsa-200703-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-23">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and information leak vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>March 20, 2007</announced>
- <revised>March 20, 2007: 01</revised>
+ <announced>2007-03-20</announced>
+ <revised>2007-03-20: 01</revised>
<bug>168529</bug>
<access>remote</access>
<affected>
@@ -69,22 +68,22 @@
</p>
<code>
- # emerge --unmerge &quot;www-apps/wordpress&quot;</code>
+ # emerge --unmerge "www-apps/wordpress"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</uri>
- <uri link="http://secunia.com/advisories/24430/">SA 24430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</uri>
+ <uri link="https://secunia.com/advisories/24430/">SA 24430</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Mar 2007 22:36:03 +0000">
+ <metadata tag="requester" timestamp="2007-03-09T22:36:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Mar 2007 15:44:31 +0000">
+ <metadata tag="submitter" timestamp="2007-03-17T15:44:31Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Mar 2007 11:36:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-20T11:36:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-24.xml b/glsa-200703-24.xml
index 45be7187..5f7ebd9c 100644
--- a/glsa-200703-24.xml
+++ b/glsa-200703-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-24">
<title>mgv: Stack overflow in included gv code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mgv</product>
- <announced>March 26, 2007</announced>
- <revised>March 26, 2007: 01</revised>
+ <announced>2007-03-26</announced>
+ <revised>2007-03-26: 01</revised>
<bug>154645</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
GSview, and unmerge mgv:
</p>
<code>
- # emerge --unmerge &quot;app-text/mgv&quot;</code>
+ # emerge --unmerge "app-text/mgv"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
- <uri link="/security/en/glsa/glsa-200611-20.xml">GLSA 200611-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-20.xml">GLSA 200611-20</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 07:32:05 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T07:32:05Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Mar 2007 02:27:18 +0000">
+ <metadata tag="submitter" timestamp="2007-03-20T02:27:18Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Mar 2007 19:59:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-26T19:59:57Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-25.xml b/glsa-200703-25.xml
index c11ec4f4..c19079e8 100644
--- a/glsa-200703-25.xml
+++ b/glsa-200703-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-25">
<title>Ekiga: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ekiga</product>
- <announced>March 29, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-03-29</announced>
+ <revised>2009-05-28: 02</revised>
<bug>167643</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-voip/ekiga-2.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-voip/ekiga-2.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1006">CVE-2007-1006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1006">CVE-2007-1006</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Mar 2007 17:17:52 +0000">
+ <metadata tag="requester" timestamp="2007-03-05T17:17:52Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Mar 2007 18:05:22 +0000">
+ <metadata tag="submitter" timestamp="2007-03-05T18:05:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:26:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:26:33Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-26.xml b/glsa-200703-26.xml
index 7802a51d..64ef7c6c 100644
--- a/glsa-200703-26.xml
+++ b/glsa-200703-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-26">
<title>file: Integer underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>March 30, 2007</announced>
- <revised>March 30, 2007: 01</revised>
+ <announced>2007-03-30</announced>
+ <revised>2007-03-30: 01</revised>
<bug>171452</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 17:59:07 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T17:59:07Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 20:27:32 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T20:27:32Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:57Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-27.xml b/glsa-200703-27.xml
index 8094a4d4..29a63ba5 100644
--- a/glsa-200703-27.xml
+++ b/glsa-200703-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-27">
<title>Squid: Denial of Service</title>
<synopsis>
Squid is affected by a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">squid</product>
- <announced>March 31, 2007</announced>
- <revised>March 31, 2007: 01</revised>
+ <announced>2007-03-31</announced>
+ <revised>2007-03-31: 01</revised>
<bug>171681</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560">CVE-2007-1560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560">CVE-2007-1560</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 22:35:04 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T22:35:04Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 20:36:04 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T20:36:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:51Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200703-28.xml b/glsa-200703-28.xml
index 81ad4ccb..294e479c 100644
--- a/glsa-200703-28.xml
+++ b/glsa-200703-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-28">
<title>CUPS: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>March 31, 2007</announced>
- <revised>March 31, 2007: 01</revised>
+ <announced>2007-03-31</announced>
+ <revised>2007-03-31: 01</revised>
<bug>170881</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720">CVE-2007-0720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720">CVE-2007-0720</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Mar 2007 14:48:39 +0000">
+ <metadata tag="requester" timestamp="2007-03-29T14:48:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Mar 2007 20:55:23 +0000">
+ <metadata tag="submitter" timestamp="2007-03-29T20:55:23Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 20:58:50 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T20:58:50Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200704-01.xml b/glsa-200704-01.xml
index 3ed1c2e9..dc760c76 100644
--- a/glsa-200704-01.xml
+++ b/glsa-200704-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-01">
<title>Asterisk: Two SIP Denial of Service vulnerabilities</title>
<synopsis>
Asterisk is vulnerable to two Denial of Service issues in the SIP channel.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>April 02, 2007</announced>
- <revised>April 02, 2007: 01</revised>
+ <announced>2007-04-02</announced>
+ <revised>2007-04-02: 01</revised>
<bug>171467</bug>
<access>remote</access>
<affected>
@@ -58,13 +57,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561">CVE-2007-1561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594">CVE-2007-1594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561">CVE-2007-1561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594">CVE-2007-1594</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 Mar 2007 20:55:47 +0000">
+ <metadata tag="submitter" timestamp="2007-03-20T20:55:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Apr 2007 16:33:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-02T16:33:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200704-02.xml b/glsa-200704-02.xml
index 7d69bad3..0b70272b 100644
--- a/glsa-200704-02.xml
+++ b/glsa-200704-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-02">
<title>MIT Kerberos 5: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthenticated remote root code execution.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171889</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956">CVE-2007-0956</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957">CVE-2007-0957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216">CVE-2007-1216</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956">CVE-2007-0956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957">CVE-2007-0957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216">CVE-2007-1216</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 16:29:27 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T16:29:27Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 20:30:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T20:30:58Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200704-03.xml b/glsa-200704-03.xml
index e99a64fa..3e9c5444 100644
--- a/glsa-200704-03.xml
+++ b/glsa-200704-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-03">
<title>OpenAFS: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
on the client.
</synopsis>
<product type="ebuild">openafs</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171662</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507">CVE-2007-1507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507">CVE-2007-1507</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Mar 2007 06:35:01 +0000">
+ <metadata tag="requester" timestamp="2007-03-25T06:35:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Mar 2007 13:53:51 +0000">
+ <metadata tag="submitter" timestamp="2007-03-28T13:53:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:30Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-04.xml b/glsa-200704-04.xml
index e11a4743..09b4e975 100644
--- a/glsa-200704-04.xml
+++ b/glsa-200704-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-04">
<title>OpenPBS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">openpbs</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>153495</bug>
<access>remote, local</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --ask --verbose sys-cluster/torque</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616">CVE-2006-5616</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616">CVE-2006-5616</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Mar 2007 23:17:18 +0000">
+ <metadata tag="requester" timestamp="2007-03-26T23:17:18Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Mar 2007 16:50:56 +0000">
+ <metadata tag="submitter" timestamp="2007-03-27T16:50:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:48 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:48Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-05.xml b/glsa-200704-05.xml
index b9a5b639..669d5508 100644
--- a/glsa-200704-05.xml
+++ b/glsa-200704-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-05">
<title>zziplib: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to user-assisted remote execution of arbitrary code.
</synopsis>
<product type="ebuild">zziplib</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171441</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/zziplib-0.13.49&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/zziplib-0.13.49"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614">CVE-2007-1614</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614">CVE-2007-1614</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 20:39:36 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T20:39:36Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 21:59:00 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T21:59:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:54 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:54Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-06.xml b/glsa-200704-06.xml
index 7cd4c11b..7bcd0c98 100644
--- a/glsa-200704-06.xml
+++ b/glsa-200704-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-06">
<title>Evince: Stack overflow in included gv code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">evince</product>
- <announced>April 06, 2007</announced>
- <revised>April 06, 2007: 01</revised>
+ <announced>2007-04-06</announced>
+ <revised>2007-04-06: 01</revised>
<bug>156573</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/evince-0.6.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/evince-0.6.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
- <uri link="/security/en/glsa/glsa-200611-20.xml">GLSA-200611-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-20.xml">GLSA-200611-20</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Mar 2007 16:08:33 +0000">
+ <metadata tag="requester" timestamp="2007-03-29T16:08:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 13:26:04 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T13:26:04Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:26Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-07.xml b/glsa-200704-07.xml
index d56d7cc5..7158351f 100644
--- a/glsa-200704-07.xml
+++ b/glsa-200704-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-07">
<title>libwpd: Multiple vulnerabilities</title>
<synopsis>
libwpd is vulnerable to several heap overflows and an integer overflow.
</synopsis>
<product type="ebuild">libwpd</product>
- <announced>April 06, 2007</announced>
- <revised>April 06, 2007: 01</revised>
+ <announced>2007-04-06</announced>
+ <revised>2007-04-06: 01</revised>
<bug>169675</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/libwpd-0.8.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/libwpd-0.8.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1466">CVE-2007-1466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1466">CVE-2007-1466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 22:18:42 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T22:18:42Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Apr 2007 12:29:29 +0000">
+ <metadata tag="submitter" timestamp="2007-04-03T12:29:29Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:58Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-08.xml b/glsa-200704-08.xml
index b1529e8d..7bac7e32 100644
--- a/glsa-200704-08.xml
+++ b/glsa-200704-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-08">
<title>DokuWiki: Cross-site scripting vulnerability</title>
<synopsis>
DokuWiki is vulnerable to a cross-site scripting attack.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>April 12, 2007</announced>
- <revised>April 12, 2007: 01</revised>
+ <announced>2007-04-12</announced>
+ <revised>2007-04-12: 01</revised>
<bug>163781</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20061106&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20061106"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6965">CVE-2006-6965</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6965">CVE-2006-6965</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 22:16:33 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T22:16:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Apr 2007 13:45:23 +0000">
+ <metadata tag="submitter" timestamp="2007-04-03T13:45:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:45Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-09.xml b/glsa-200704-09.xml
index 7b20bb44..5dd4f558 100644
--- a/glsa-200704-09.xml
+++ b/glsa-200704-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-09">
<title>xine-lib: Heap-based buffer overflow</title>
<synopsis>
xine-lib is vulnerable to a heap-based buffer overflow.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 14, 2007</announced>
- <revised>April 14, 2007: 01</revised>
+ <announced>2007-04-14</announced>
+ <revised>2007-04-14: 01</revised>
<bug>170208</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Mar 2007 17:27:51 +0000">
+ <metadata tag="requester" timestamp="2007-03-22T17:27:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 15:54:20 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T15:54:20Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:28:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:28:59Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-10.xml b/glsa-200704-10.xml
index ba29b298..3cde7d7e 100644
--- a/glsa-200704-10.xml
+++ b/glsa-200704-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-10">
<title>Inkscape: Two format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">Inkscape</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>171799</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/inkscape-0.45.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/inkscape-0.45.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463">CVE-2007-1463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464">CVE-2007-1464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463">CVE-2007-1463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464">CVE-2007-1464</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 Apr 2007 20:15:01 +0000">
+ <metadata tag="submitter" timestamp="2007-04-09T20:15:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:16:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:16:25Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-11.xml b/glsa-200704-11.xml
index 65fc90ec..04041cbc 100644
--- a/glsa-200704-11.xml
+++ b/glsa-200704-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-11">
<title>Vixie Cron: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>164466</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/vixie-cron-4.1-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/vixie-cron-4.1-r10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856">CVE-2007-1856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856">CVE-2007-1856</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 15:58:28 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T15:58:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 21:36:24 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T21:36:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Apr 2007 18:10:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-16T18:10:18Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200704-12.xml b/glsa-200704-12.xml
index 0648355a..ef076516 100644
--- a/glsa-200704-12.xml
+++ b/glsa-200704-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-12">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenOffice.org</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>170828</bug>
<access>remote</access>
<affected>
@@ -56,27 +55,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.1.0-r1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238">CVE-2007-0238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239">CVE-2007-0239</uri>
- <uri link="/security/en/glsa/glsa-200704-07.xml">GLSA-200704-07</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238">CVE-2007-0238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239">CVE-2007-0239</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-07.xml">GLSA-200704-07</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Apr 2007 10:02:01 +0000">
+ <metadata tag="requester" timestamp="2007-04-11T10:02:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Apr 2007 18:10:31 +0000">
+ <metadata tag="submitter" timestamp="2007-04-11T18:10:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:15:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-13.xml b/glsa-200704-13.xml
index 22e6e3dc..4e5ed22f 100644
--- a/glsa-200704-13.xml
+++ b/glsa-200704-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-13">
<title>File: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
service.
</synopsis>
<product type="ebuild">file</product>
- <announced>April 17, 2007</announced>
- <revised>September 17, 2007: 02</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-09-17: 02</revised>
<bug>174217</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026">CVE-2007-2026</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026">CVE-2007-2026</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Apr 2007 22:06:47 +0000">
+ <metadata tag="requester" timestamp="2007-04-11T22:06:47Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 13:54:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T13:54:28Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 12:18:04 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T12:18:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-14.xml b/glsa-200704-14.xml
index 065e771a..7f7df846 100644
--- a/glsa-200704-14.xml
+++ b/glsa-200704-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-14">
<title>FreeRADIUS: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">FreeRADIUS</product>
- <announced>April 17, 2007</announced>
- <revised>April 17, 2007: 01</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-04-17: 01</revised>
<bug>174292</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028">CVE-2007-2028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028">CVE-2007-2028</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 07:08:42 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T07:08:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 11:53:35 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T11:53:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Apr 2007 12:22:49 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-13T12:22:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-15.xml b/glsa-200704-15.xml
index 5e278eb3..0e527567 100644
--- a/glsa-200704-15.xml
+++ b/glsa-200704-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-15">
<title>MadWifi: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to a Denial of Service and information disclosure.
</synopsis>
<product type="ebuild">Madwifi-ng</product>
- <announced>April 17, 2007</announced>
- <revised>April 21, 2007: 02</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-04-21: 02</revised>
<bug>173434</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178">CVE-2006-7178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179">CVE-2006-7179</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180">CVE-2006-7180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178">CVE-2006-7178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179">CVE-2006-7179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180">CVE-2006-7180</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Apr 2007 12:32:14 +0000">
+ <metadata tag="submitter" timestamp="2007-04-11T12:32:14Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:16:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:16:05Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-16.xml b/glsa-200704-16.xml
index 1362a8fb..182829ab 100644
--- a/glsa-200704-16.xml
+++ b/glsa-200704-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-16">
<title>Aircrack-ng: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>April 22, 2007</announced>
- <revised>April 22, 2007: 01</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-22: 01</revised>
<bug>174340</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/aircrack-ng-0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/aircrack-ng-0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2057">CVE-2007-2057</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2057">CVE-2007-2057</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 21:21:54 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T21:21:54Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Apr 2007 21:24:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-13T21:24:05Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Apr 2007 22:00:25 +0000">
+ <metadata tag="submitter" timestamp="2007-04-14T22:00:25Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-17.xml b/glsa-200704-17.xml
index 633590d8..5325bef7 100644
--- a/glsa-200704-17.xml
+++ b/glsa-200704-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-17">
<title>3proxy: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">3proxy</product>
- <announced>April 22, 2007</announced>
- <revised>April 22, 2007: 01</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-22: 01</revised>
<bug>174429</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/3proxy-0.5.3h&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/3proxy-0.5.3h"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2031">CVE-2007-2031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2031">CVE-2007-2031</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Apr 2007 05:09:29 +0000">
+ <metadata tag="requester" timestamp="2007-04-18T05:09:29Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Apr 2007 08:45:40 +0000">
+ <metadata tag="submitter" timestamp="2007-04-18T08:45:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Apr 2007 20:45:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-18T20:45:40Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-18.xml b/glsa-200704-18.xml
index b4c47528..b2029980 100644
--- a/glsa-200704-18.xml
+++ b/glsa-200704-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-18">
<title>Courier-IMAP: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution with root privileges.
</synopsis>
<product type="ebuild">courier-imap</product>
- <announced>April 22, 2007</announced>
- <revised>April 23, 2007: 02</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-23: 02</revised>
<bug>168196</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/courier-imap-4.0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/courier-imap-4.0.6-r2"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Thu, 12 Apr 2007 14:15:03 +0000">
+ <metadata tag="requester" timestamp="2007-04-12T14:15:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 14:15:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T14:15:17Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Apr 2007 21:50:11 +0000">
+ <metadata tag="submitter" timestamp="2007-04-16T21:50:11Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-19.xml b/glsa-200704-19.xml
index b3d2176e..fcbed735 100644
--- a/glsa-200704-19.xml
+++ b/glsa-200704-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-19">
<title>Blender: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">Blender</product>
- <announced>April 23, 2007</announced>
- <revised>April 23, 2007: 01</revised>
+ <announced>2007-04-23</announced>
+ <revised>2007-04-23: 01</revised>
<bug>168907</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.43"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1253">CVE-2007-1253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1253">CVE-2007-1253</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Apr 2007 18:07:32 +0000">
+ <metadata tag="requester" timestamp="2007-04-17T18:07:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Apr 2007 09:36:27 +0000">
+ <metadata tag="submitter" timestamp="2007-04-18T09:36:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Apr 2007 20:46:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-18T20:46:11Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-20.xml b/glsa-200704-20.xml
index 8f2a03f8..13279a7d 100644
--- a/glsa-200704-20.xml
+++ b/glsa-200704-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-20">
<title>NAS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
result in the execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">NAS</product>
- <announced>April 23, 2007</announced>
- <revised>April 23, 2007: 01</revised>
+ <announced>2007-04-23</announced>
+ <revised>2007-04-23: 01</revised>
<bug>171428</bug>
<access>remote</access>
<affected>
@@ -51,22 +50,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/nas-1.8b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/nas-1.8b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1543">CVE-2007-1543</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1544">CVE-2007-1544</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1545">CVE-2007-1545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1546">CVE-2007-1546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1547">CVE-2007-1547</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1543">CVE-2007-1543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1544">CVE-2007-1544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1545">CVE-2007-1545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1546">CVE-2007-1546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1547">CVE-2007-1547</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 13:48:29 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T13:48:29Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 15:19:59 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T15:19:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 14:16:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T14:16:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200704-21.xml b/glsa-200704-21.xml
index afaf3422..d9f785f1 100644
--- a/glsa-200704-21.xml
+++ b/glsa-200704-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-21">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ClamAV</product>
- <announced>April 24, 2007</announced>
- <revised>April 24, 2007: 01</revised>
+ <announced>2007-04-24</announced>
+ <revised>2007-04-24: 01</revised>
<bug>174375</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745">CVE-2007-1745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997">CVE-2007-1997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745">CVE-2007-1745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997">CVE-2007-1997</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Apr 2007 22:33:19 +0000">
+ <metadata tag="requester" timestamp="2007-04-14T22:33:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Apr 2007 10:34:20 +0000">
+ <metadata tag="submitter" timestamp="2007-04-19T10:34:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Apr 2007 20:58:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-22T20:58:42Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200704-22.xml b/glsa-200704-22.xml
index 58245301..e3aed7f8 100644
--- a/glsa-200704-22.xml
+++ b/glsa-200704-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-22">
<title>BEAST: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">BEAST</product>
- <announced>April 27, 2007</announced>
- <revised>April 27, 2007: 01</revised>
+ <announced>2007-04-27</announced>
+ <revised>2007-04-27: 01</revised>
<bug>163146</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/beast-0.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/beast-0.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Apr 2007 08:02:22 +0000">
+ <metadata tag="requester" timestamp="2007-04-04T08:02:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Apr 2007 18:26:01 +0000">
+ <metadata tag="submitter" timestamp="2007-04-04T18:26:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Apr 2007 18:26:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-06T18:26:41Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200704-23.xml b/glsa-200704-23.xml
index 028faebf..ab3d35bc 100644
--- a/glsa-200704-23.xml
+++ b/glsa-200704-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-23">
<title>capi4k-utils: Buffer overflow</title>
<synopsis>
capi4k-utils is vulnerable to a buffer overflow in the bufprint() function.
</synopsis>
<product type="ebuild">capi4k-utils</product>
- <announced>April 27, 2007</announced>
- <revised>April 27, 2007: 01</revised>
+ <announced>2007-04-27</announced>
+ <revised>2007-04-27: 01</revised>
<bug>170870</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/capi4k-utils-20050718-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/capi4k-utils-20050718-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1217">CVE-2007-1217</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1217">CVE-2007-1217</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 12:42:52 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T12:42:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 14:51:21 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T14:51:21Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:34Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200705-01.xml b/glsa-200705-01.xml
index 505a74f2..4d6e1fa9 100644
--- a/glsa-200705-01.xml
+++ b/glsa-200705-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-01">
<title>Ktorrent: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">ktorrent</product>
- <announced>May 01, 2007</announced>
- <revised>May 01, 2007: 01</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-01: 01</revised>
<bug>170303</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/ktorrent-2.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384">CVE-2007-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385">CVE-2007-1385</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799">CVE-2007-1799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384">CVE-2007-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385">CVE-2007-1385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799">CVE-2007-1799</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:42:10 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:42:10Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 07:58:35 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T07:58:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Apr 2007 07:59:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-26T07:59:01Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-02.xml b/glsa-200705-02.xml
index 26e18a72..3b7a3b62 100644
--- a/glsa-200705-02.xml
+++ b/glsa-200705-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-02">
<title>FreeType: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 01, 2007</announced>
- <revised>May 27, 2007: 02</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-27: 02</revised>
<bug>172577</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.1.10-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.1.10-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Apr 2007 09:19:23 +0000">
+ <metadata tag="requester" timestamp="2007-04-12T09:19:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 09:19:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T09:19:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 08:55:44 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T08:55:44Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-03.xml b/glsa-200705-03.xml
index ecfa4d48..27cbc597 100644
--- a/glsa-200705-03.xml
+++ b/glsa-200705-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-03">
<title>Tomcat: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure of sensitive information.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>May 01, 2007</announced>
- <revised>May 01, 2007: 01</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-01: 01</revised>
<bug>173122</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-5.5.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-5.5.22"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450">CVE-2007-0450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450">CVE-2007-0450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:49:54 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:49:54Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 20:54:19 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T20:54:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Apr 2007 20:54:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-25T20:54:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-04.xml b/glsa-200705-04.xml
index 87719c90..b8b56d03 100644
--- a/glsa-200705-04.xml
+++ b/glsa-200705-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-04">
<title>Apache mod_perl: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
processing regular expressions.
</synopsis>
<product type="ebuild">mod_perl</product>
- <announced>May 02, 2007</announced>
- <revised>May 02, 2007: 02</revised>
+ <announced>2007-05-02</announced>
+ <revised>2007-05-02: 02</revised>
<bug>172676</bug>
<access>remote</access>
<affected>
@@ -49,24 +48,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_perl-1.30&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_perl-1.30"</code>
<p>
All mod_perl 2.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_perl-2.0.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_perl-2.0.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349">CVE-2007-1349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349">CVE-2007-1349</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Apr 2007 19:53:36 +0000">
+ <metadata tag="requester" timestamp="2007-04-23T19:53:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Apr 2007 15:28:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-24T15:28:21Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:05:17 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:05:17Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-05.xml b/glsa-200705-05.xml
index 2cc1029b..da10f994 100644
--- a/glsa-200705-05.xml
+++ b/glsa-200705-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-05">
<title>Quagga: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>May 02, 2007</announced>
- <revised>May 02, 2007: 01</revised>
+ <announced>2007-05-02</announced>
+ <revised>2007-05-02: 01</revised>
<bug>174206</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/quagga-0.98.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/quagga-0.98.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995">CVE-2007-1995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995">CVE-2007-1995</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Apr 2007 20:01:28 +0000">
+ <metadata tag="requester" timestamp="2007-04-23T20:01:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:27:10 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:27:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Apr 2007 08:45:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-30T08:45:01Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-06.xml b/glsa-200705-06.xml
index 9e8c17cf..c9a5ac48 100644
--- a/glsa-200705-06.xml
+++ b/glsa-200705-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-06">
<title>X.Org X11 library: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libx11</product>
- <announced>May 05, 2007</announced>
- <revised>May 05, 2007: 01</revised>
+ <announced>2007-05-05</announced>
+ <revised>2007-05-05: 01</revised>
<bug>172752</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libX11-1.0.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libX11-1.0.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Apr 2007 14:52:56 +0000">
+ <metadata tag="requester" timestamp="2007-04-18T14:52:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 20 Apr 2007 16:53:31 +0000">
+ <metadata tag="submitter" timestamp="2007-04-20T16:53:31Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Apr 2007 12:10:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-23T12:10:37Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200705-07.xml b/glsa-200705-07.xml
index 19cc0eac..399f7bbf 100644
--- a/glsa-200705-07.xml
+++ b/glsa-200705-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-07">
<title>Lighttpd: Two Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>May 07, 2007</announced>
- <revised>May 07, 2007: 01</revised>
+ <announced>2007-05-07</announced>
+ <revised>2007-05-07: 01</revised>
<bug>174043</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1869">CVE-2007-1869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1870">CVE-2007-1870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1869">CVE-2007-1869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1870">CVE-2007-1870</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Apr 2007 09:09:47 +0000">
+ <metadata tag="requester" timestamp="2007-04-30T09:09:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 May 2007 19:04:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-01T19:04:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:36:16 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:36:16Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-08.xml b/glsa-200705-08.xml
index 88ca2806..8ded2ad6 100644
--- a/glsa-200705-08.xml
+++ b/glsa-200705-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-08">
<title>GIMP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>May 07, 2007</announced>
- <revised>May 07, 2007: 01</revised>
+ <announced>2007-05-07</announced>
+ <revised>2007-05-07: 01</revised>
<bug>176226</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356">CVE-2007-2356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356">CVE-2007-2356</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:00:37 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:00:37Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 May 2007 21:03:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-06T21:03:26Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-09.xml b/glsa-200705-09.xml
index 9b1b25af..1326aeb3 100644
--- a/glsa-200705-09.xml
+++ b/glsa-200705-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-09">
<title>IPsec-Tools: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
the IPsec tunnel.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>173219</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841">CVE-2007-1841</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841">CVE-2007-1841</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:53:19 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:53:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 12:07:13 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T12:07:13Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 May 2007 19:54:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-07T19:54:14Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200705-10.xml b/glsa-200705-10.xml
index a118298e..00af732a 100644
--- a/glsa-200705-10.xml
+++ b/glsa-200705-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-10">
<title>LibXfont, TightVNC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">tightvnc, libxfont</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>172575</bug>
<bug>174200</bug>
<access>local</access>
@@ -53,26 +52,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.7-r1"</code>
<p>
All TightVNC users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tightvnc-1.2.9-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tightvnc-1.2.9-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Apr 2007 09:12:59 +0000">
+ <metadata tag="requester" timestamp="2007-04-17T09:12:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Apr 2007 12:11:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-23T12:11:04Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 19:02:32 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T19:02:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-11.xml b/glsa-200705-11.xml
index f91e3031..d033d533 100644
--- a/glsa-200705-11.xml
+++ b/glsa-200705-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-11">
<title>MySQL: Two Denial of Service vulnerabilities</title>
<synopsis>
Two Denial of Service vulnerabilities have been discovered in MySQL.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>170126</bug>
<bug>171934</bug>
<access>remote</access>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.38&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.38"</code>
</resolution>
<references>
- <uri link="http://bugs.mysql.com/bug.php?id=27513">Original Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1420">CVE-2007-1420</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=27513">Original Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1420">CVE-2007-1420</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:47:08 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:47:08Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:17:16 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:17:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Apr 2007 21:17:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-25T21:17:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-12.xml b/glsa-200705-12.xml
index 9b52fb26..52569e61 100644
--- a/glsa-200705-12.xml
+++ b/glsa-200705-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-12">
<title>PostgreSQL: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>May 10, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-05-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>175791</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
<p>
In order to fix the SECURITY DEFINER functions, PostgreSQL users are
- advised to refer to the PostgreSQL documentation: <uri
- link="http://www.postgresql.org/docs/techdocs.77">http://www.postgresql
+ advised to refer to the PostgreSQL documentation: <uri link="http://www.postgresql.org/docs/techdocs.77">http://www.postgresql
.org/docs/techdocs.77</uri>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:37:29 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:37:29Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 22:14:19 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T22:14:19Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 May 2007 06:08:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-08T06:08:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200705-13.xml b/glsa-200705-13.xml
index 4e1e32ec..fbfc8bde 100644
--- a/glsa-200705-13.xml
+++ b/glsa-200705-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-13">
<title>ImageMagick: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>May 10, 2007</announced>
- <revised>June 07, 2007: 02</revised>
+ <announced>2007-05-10</announced>
+ <revised>2007-06-07: 02</revised>
<bug>152672</bug>
<bug>159567</bug>
<bug>173186</bug>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Apr 2007 13:08:15 +0000">
+ <metadata tag="requester" timestamp="2007-04-30T13:08:15Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 May 2007 19:04:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-01T19:04:55Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:19:41 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:19:41Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-14.xml b/glsa-200705-14.xml
index 0362ccb7..21c94257 100644
--- a/glsa-200705-14.xml
+++ b/glsa-200705-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-14">
<title>XScreenSaver: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
configurations.
</synopsis>
<product type="ebuild">xscreensaver</product>
- <announced>May 13, 2007</announced>
- <revised>May 13, 2007: 01</revised>
+ <announced>2007-05-13</announced>
+ <revised>2007-05-13: 01</revised>
<bug>176584</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xscreensaver-5.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xscreensaver-5.02"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859">CVE-2007-1859</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859">CVE-2007-1859</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 May 2007 10:52:36 +0000">
+ <metadata tag="requester" timestamp="2007-05-08T10:52:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 May 2007 15:43:15 +0000">
+ <metadata tag="submitter" timestamp="2007-05-08T15:43:15Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 May 2007 21:32:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-13T21:32:41Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200705-15.xml b/glsa-200705-15.xml
index aaf4900c..28d1c44c 100644
--- a/glsa-200705-15.xml
+++ b/glsa-200705-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-15">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">samba</product>
- <announced>May 15, 2007</announced>
- <revised>May 15, 2007: 01</revised>
+ <announced>2007-05-15</announced>
+ <revised>2007-05-15: 01</revised>
<bug>177029</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.24-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.24-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 May 2007 17:44:45 +0000">
+ <metadata tag="submitter" timestamp="2007-05-14T17:44:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 May 2007 12:42:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-15T12:42:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200705-16.xml b/glsa-200705-16.xml
index 31baecc3..e8a82aef 100644
--- a/glsa-200705-16.xml
+++ b/glsa-200705-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-16">
<title>PhpWiki: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>May 17, 2007</announced>
- <revised>May 17, 2007: 01</revised>
+ <announced>2007-05-17</announced>
+ <revised>2007-05-17: 01</revised>
<bug>174451</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.10-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.10-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2024">CVE-2007-2024</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2025">CVE-2007-2025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2024">CVE-2007-2024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2025">CVE-2007-2025</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 May 2007 13:26:06 +0000">
+ <metadata tag="requester" timestamp="2007-05-10T13:26:06Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 May 2007 14:10:41 +0000">
+ <metadata tag="submitter" timestamp="2007-05-11T14:10:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 May 2007 18:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-14T18:47:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-17.xml b/glsa-200705-17.xml
index 70ead57a..82c7b4b6 100644
--- a/glsa-200705-17.xml
+++ b/glsa-200705-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-17">
<title>Apache mod_security: Rule bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to bypass rules.
</synopsis>
<product type="ebuild">mod_security</product>
- <announced>May 17, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-05-17</announced>
+ <revised>2007-12-30: 02</revised>
<bug>169778</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_security-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_security-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1359">CVE-2007-1359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1359">CVE-2007-1359</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 May 2007 23:14:33 +0000">
+ <metadata tag="requester" timestamp="2007-05-11T23:14:33Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 May 2007 04:49:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-13T04:49:45Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 May 2007 13:46:57 +0000">
+ <metadata tag="submitter" timestamp="2007-05-13T13:46:57Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-18.xml b/glsa-200705-18.xml
index 93d2918f..8b7b4547 100644
--- a/glsa-200705-18.xml
+++ b/glsa-200705-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-18">
<title>PPTPD: Denial of Service attack</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">pptpd</product>
- <announced>May 20, 2007</announced>
- <revised>May 20, 2007: 01</revised>
+ <announced>2007-05-20</announced>
+ <revised>2007-05-20: 01</revised>
<bug>176936</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/pptpd-1.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/pptpd-1.3.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0244">CVE-2007-0244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0244">CVE-2007-0244</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 May 2007 07:06:10 +0000">
+ <metadata tag="requester" timestamp="2007-05-11T07:06:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 May 2007 07:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-11T07:14:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 May 2007 17:58:13 +0000">
+ <metadata tag="submitter" timestamp="2007-05-14T17:58:13Z">
dizzutch
</metadata>
</glsa>
diff --git a/glsa-200705-19.xml b/glsa-200705-19.xml
index 78004619..9ff9f0d8 100644
--- a/glsa-200705-19.xml
+++ b/glsa-200705-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-19">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>May 26, 2007</announced>
- <revised>March 29, 2008: 02</revised>
+ <announced>2007-05-26</announced>
+ <revised>2008-03-29: 02</revised>
<bug>169372</bug>
<access>remote</access>
<affected>
@@ -64,39 +63,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.2"</code>
<p>
All PHP 4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001">CVE-2007-1001</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285">CVE-2007-1285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484">CVE-2007-1484</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521">CVE-2007-1521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583">CVE-2007-1583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700">CVE-2007-1700</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1701">CVE-2007-1701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711">CVE-2007-1711</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717">CVE-2007-1717</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718">CVE-2007-1718</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864">CVE-2007-1864</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509">CVE-2007-2509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510">CVE-2007-2510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511">CVE-2007-2511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001">CVE-2007-1001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285">CVE-2007-1285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484">CVE-2007-1484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521">CVE-2007-1521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583">CVE-2007-1583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700">CVE-2007-1700</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1701">CVE-2007-1701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711">CVE-2007-1711</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717">CVE-2007-1717</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718">CVE-2007-1718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864">CVE-2007-1864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509">CVE-2007-2509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510">CVE-2007-2510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511">CVE-2007-2511</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 May 2007 07:27:54 +0000">
+ <metadata tag="requester" timestamp="2007-05-20T07:27:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 May 2007 07:28:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-20T07:28:08Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 May 2007 21:15:17 +0000">
+ <metadata tag="submitter" timestamp="2007-05-21T21:15:17Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200705-20.xml b/glsa-200705-20.xml
index f110feef..5a391a0b 100644
--- a/glsa-200705-20.xml
+++ b/glsa-200705-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-20">
<title>Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
unspecified vulnerabilities that already affected the Sun JDK and JRE.
</synopsis>
<product type="ebuild">blackdown-jdk,blackdown-jre</product>
- <announced>May 26, 2007</announced>
- <revised>May 26, 2007: 01</revised>
+ <announced>2007-05-26</announced>
+ <revised>2007-05-26: 01</revised>
<bug>161835</bug>
<access>remote</access>
<affected>
@@ -67,22 +66,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/blackdown-jdk&quot;
- # emerge --ask --oneshot --verbose &quot;dev-java/blackdown-jre&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/blackdown-jdk"
+ # emerge --ask --oneshot --verbose "dev-java/blackdown-jre"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:56:59 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:56:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 22:34:22 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T22:34:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 May 2007 21:16:03 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-21T21:16:03Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200705-21.xml b/glsa-200705-21.xml
index 8e0e4697..b80e792f 100644
--- a/glsa-200705-21.xml
+++ b/glsa-200705-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-21">
<title>MPlayer: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 30, 2007</announced>
- <revised>October 12, 2007: 02</revised>
+ <announced>2007-05-30</announced>
+ <revised>2007-10-12: 02</revised>
<bug>168917</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20070321&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20070321"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387">CVE-2007-1387</uri>
- <uri link="/security/en/glsa/glsa-200704-09.xml">GLSA 200704-09</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387">CVE-2007-1387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-09.xml">GLSA 200704-09</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 May 2007 07:29:09 +0000">
+ <metadata tag="requester" timestamp="2007-05-20T07:29:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 May 2007 07:29:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-20T07:29:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 May 2007 13:01:40 +0000">
+ <metadata tag="submitter" timestamp="2007-05-21T13:01:40Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-22.xml b/glsa-200705-22.xml
index c8c43791..5c387b6d 100644
--- a/glsa-200705-22.xml
+++ b/glsa-200705-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-22">
<title>FreeType: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 30, 2007</announced>
- <revised>May 30, 2007: 01</revised>
+ <announced>2007-05-30</announced>
+ <revised>2007-05-30: 01</revised>
<bug>179161</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 May 2007 15:08:56 +0000">
+ <metadata tag="requester" timestamp="2007-05-22T15:08:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 May 2007 15:38:03 +0000">
+ <metadata tag="submitter" timestamp="2007-05-22T15:38:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 May 2007 16:46:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-27T16:46:08Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-23.xml b/glsa-200705-23.xml
index 5c9b2489..f55e3cec 100644
--- a/glsa-200705-23.xml
+++ b/glsa-200705-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-23">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">sun-jdk,sun-jre-bin</product>
- <announced>May 31, 2007</announced>
- <revised>May 28, 2009: 05</revised>
+ <announced>2007-05-31</announced>
+ <revised>2009-05-28: 05</revised>
<bug>176675</bug>
<bug>178851</bug>
<access>remote</access>
@@ -74,27 +73,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jdk&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jdk"</code>
<p>
All Sun Java Runtime Environment users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jre-bin&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 May 2007 03:51:23 +0000">
+ <metadata tag="requester" timestamp="2007-05-21T03:51:23Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 May 2007 22:03:03 +0000">
+ <metadata tag="submitter" timestamp="2007-05-27T22:03:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 08:44:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T08:44:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-24.xml b/glsa-200705-24.xml
index 31923a18..e3fb4a02 100644
--- a/glsa-200705-24.xml
+++ b/glsa-200705-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-24">
<title>libpng: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>May 31, 2007</announced>
- <revised>May 31, 2007: 01</revised>
+ <announced>2007-05-31</announced>
+ <revised>2007-05-31: 01</revised>
<bug>178004</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.18"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445">CVE-2007-2445</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445">CVE-2007-2445</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 May 2007 07:35:26 +0000">
+ <metadata tag="requester" timestamp="2007-05-27T07:35:26Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 May 2007 13:49:05 +0000">
+ <metadata tag="submitter" timestamp="2007-05-27T13:49:05Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 08:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T08:41:58Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200705-25.xml b/glsa-200705-25.xml
index 242c4fd9..aff71cbc 100644
--- a/glsa-200705-25.xml
+++ b/glsa-200705-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-25">
<title>file: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>May 31, 2007</announced>
- <revised>June 01, 2007: 02</revised>
+ <announced>2007-05-31</announced>
+ <revised>2007-06-01: 02</revised>
<bug>179583</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 28 May 2007 10:04:58 +0000">
+ <metadata tag="submitter" timestamp="2007-05-28T10:04:58Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 06:59:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T06:59:45Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200706-01.xml b/glsa-200706-01.xml
index 2c6e6ba5..74a7a191 100644
--- a/glsa-200706-01.xml
+++ b/glsa-200706-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-01">
<title>libexif: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
it vulnerable to an integer overflow.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>June 05, 2007</announced>
- <revised>June 05, 2007: 01</revised>
+ <announced>2007-06-05</announced>
+ <revised>2007-06-05: 01</revised>
<bug>178081</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.15&quot;
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.15"
# revdep-rebuild --library=/usr/lib/libexif.so</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645">CVE-2007-2645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645">CVE-2007-2645</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Jun 2007 18:50:35 +0000">
+ <metadata tag="submitter" timestamp="2007-06-05T18:50:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jun 2007 06:19:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-03T06:19:11Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200706-02.xml b/glsa-200706-02.xml
index ef793186..7a3d987d 100644
--- a/glsa-200706-02.xml
+++ b/glsa-200706-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-02">
<title>Evolution: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>June 06, 2007</announced>
- <revised>June 06, 2007: 01</revised>
+ <announced>2007-06-06</announced>
+ <revised>2007-06-06: 01</revised>
<bug>170879</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.8.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.8.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1002">CVE-2007-1002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1002">CVE-2007-1002</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jun 2007 07:29:21 +0000">
+ <metadata tag="requester" timestamp="2007-06-02T07:29:21Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Jun 2007 18:06:03 +0000">
+ <metadata tag="submitter" timestamp="2007-06-03T18:06:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jun 2007 20:42:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-06T20:42:46Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200706-03.xml b/glsa-200706-03.xml
index 64f182ce..f9bbf034 100644
--- a/glsa-200706-03.xml
+++ b/glsa-200706-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-03">
<title>ELinks: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">elinks</product>
- <announced>June 06, 2007</announced>
- <revised>June 06, 2007: 01</revised>
+ <announced>2007-06-06</announced>
+ <revised>2007-06-06: 01</revised>
<bug>177512</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/elinks-0.11.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/elinks-0.11.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2027">CVE-2007-2027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2027">CVE-2007-2027</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Jun 2007 06:18:54 +0000">
+ <metadata tag="requester" timestamp="2007-06-03T06:18:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jun 2007 06:19:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-03T06:19:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Jun 2007 17:56:00 +0000">
+ <metadata tag="submitter" timestamp="2007-06-03T17:56:00Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200706-04.xml b/glsa-200706-04.xml
index 1194d4fc..d24dae85 100644
--- a/glsa-200706-04.xml
+++ b/glsa-200706-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-04">
<title>MadWifi: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>June 11, 2007</announced>
- <revised>June 11, 2007: 01</revised>
+ <announced>2007-06-11</announced>
+ <revised>2007-06-11: 01</revised>
<bug>179532</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2829">CVE-2007-2829</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2830">CVE-2007-2830</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2831">CVE-2007-2831</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2829">CVE-2007-2829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2830">CVE-2007-2830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2831">CVE-2007-2831</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jun 2007 06:19:00 +0000">
+ <metadata tag="requester" timestamp="2007-06-08T06:19:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 14:16:00 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T14:16:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 14:16:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T14:16:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200706-05.xml b/glsa-200706-05.xml
index a993d464..acfab327 100644
--- a/glsa-200706-05.xml
+++ b/glsa-200706-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-05">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
ClamAV contains several vulnerabilities leading to a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>June 15, 2007</announced>
- <revised>June 15, 2007: 01</revised>
+ <announced>2007-06-15</announced>
+ <revised>2007-06-15: 01</revised>
<bug>178082</bug>
<access>remote, local</access>
<affected>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650">CVE-2007-2650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023">CVE-2007-3023</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024">CVE-2007-3024</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122">CVE-2007-3122</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123">CVE-2007-3123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650">CVE-2007-2650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023">CVE-2007-3023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024">CVE-2007-3024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122">CVE-2007-3122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123">CVE-2007-3123</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jun 2007 06:17:07 +0000">
+ <metadata tag="requester" timestamp="2007-06-08T06:17:07Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 18:13:18 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T18:13:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 18:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T18:15:09Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200706-06.xml b/glsa-200706-06.xml
index 4856d5cf..33185210 100644
--- a/glsa-200706-06.xml
+++ b/glsa-200706-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-06">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox,mozilla-thunderbird,mozilla-firefox-bin,mozilla-thunderbird-bin,seamonkey,seamonkey-bin,xulrunner</product>
- <announced>June 19, 2007</announced>
- <revised>June 19, 2007: 01</revised>
+ <announced>2007-06-19</announced>
+ <revised>2007-06-19: 01</revised>
<bug>180436</bug>
<access>remote</access>
<affected>
@@ -87,61 +86,61 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.4"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.4"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.4"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.2"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.2"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362">CVE-2007-1362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867">CVE-2007-2867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868">CVE-2007-2868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869">CVE-2007-2869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870">CVE-2007-2870</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871">CVE-2007-2871</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362">CVE-2007-1362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867">CVE-2007-2867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868">CVE-2007-2868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869">CVE-2007-2869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870">CVE-2007-2870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871">CVE-2007-2871</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:58:45 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:58:45Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Jun 2007 22:03:24 +0000">
+ <metadata tag="submitter" timestamp="2007-06-11T22:03:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Jun 2007 21:03:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-19T21:03:22Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200706-07.xml b/glsa-200706-07.xml
index ddd31698..7612d419 100644
--- a/glsa-200706-07.xml
+++ b/glsa-200706-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-07">
<title>PHProjekt: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">phprojekt</product>
- <announced>June 19, 2007</announced>
- <revised>June 19, 2007: 01</revised>
+ <announced>2007-06-19</announced>
+ <revised>2007-06-19: 01</revised>
<bug>170905</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-5.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-5.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1575">CVE-2007-1575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1576">CVE-2007-1576</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1638">CVE-2007-1638</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1639">CVE-2007-1639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1575">CVE-2007-1575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1576">CVE-2007-1576</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1638">CVE-2007-1638</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1639">CVE-2007-1639</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:18:57 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:18:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 13:59:19 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T13:59:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 13:59:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T13:59:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200706-08.xml b/glsa-200706-08.xml
index 36c79d81..b7e916ba 100644
--- a/glsa-200706-08.xml
+++ b/glsa-200706-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-08">
<title>emul-linux-x86-java: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Service.
</synopsis>
<product type="ebuild">emul-linux-x86-java</product>
- <announced>June 26, 2007</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2007-06-26</announced>
+ <revised>2009-05-28: 03</revised>
<bug>178962</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:24:22 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:24:22Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 14:32:58 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T14:32:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 14:33:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T14:33:07Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200706-09.xml b/glsa-200706-09.xml
index a0d8edab..13d5ad92 100644
--- a/glsa-200706-09.xml
+++ b/glsa-200706-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-09">
<title>libexif: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>June 26, 2007</announced>
- <revised>June 26, 2007: 01</revised>
+ <announced>2007-06-26</announced>
+ <revised>2007-06-26: 01</revised>
<bug>181922</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4168">CVE-2006-4168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4168">CVE-2006-4168</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Jun 2007 06:17:21 +0000">
+ <metadata tag="requester" timestamp="2007-06-16T06:17:21Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 16 Jun 2007 06:17:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-16T06:17:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Jun 2007 02:58:18 +0000">
+ <metadata tag="submitter" timestamp="2007-06-19T02:58:18Z">
shellsage
</metadata>
</glsa>
diff --git a/glsa-200707-01.xml b/glsa-200707-01.xml
index 6a51b00a..3238443f 100644
--- a/glsa-200707-01.xml
+++ b/glsa-200707-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-01">
<title>Firebird: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>July 01, 2007</announced>
- <revised>July 01, 2007: 01</revised>
+ <announced>2007-07-01</announced>
+ <revised>2007-07-01: 01</revised>
<bug>181811</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3181">CVE-2007-3181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3181">CVE-2007-3181</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 19:06:37 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T19:06:37Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jun 2007 18:04:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-26T18:04:58Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-02.xml b/glsa-200707-02.xml
index 72c2891b..6b01d8fc 100644
--- a/glsa-200707-02.xml
+++ b/glsa-200707-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-02">
<title>OpenOffice.org: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>July 02, 2007</announced>
- <revised>July 02, 2007: 01</revised>
+ <announced>2007-07-02</announced>
+ <revised>2007-07-02: 01</revised>
<bug>181773</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.2.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245">CVE-2007-0245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245">CVE-2007-0245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 15:57:23 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T15:57:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jun 2007 15:57:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-25T15:57:59Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200707-03.xml b/glsa-200707-03.xml
index 25b77dbc..ac115842 100644
--- a/glsa-200707-03.xml
+++ b/glsa-200707-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-03">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution-data-server</product>
- <announced>July 02, 2007</announced>
- <revised>July 02, 2007: 01</revised>
+ <announced>2007-07-02</announced>
+ <revised>2007-07-02: 01</revised>
<bug>182011</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;gnome-extra/evolution-data-server&quot;</code>
+ # emerge --ask --oneshot --verbose "gnome-extra/evolution-data-server"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Jun 2007 15:13:37 +0000">
+ <metadata tag="requester" timestamp="2007-06-20T15:13:37Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 16:19:12 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T16:19:12Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jun 2007 16:19:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-25T16:19:36Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200707-04.xml b/glsa-200707-04.xml
index 0c76351c..15fe45bb 100644
--- a/glsa-200707-04.xml
+++ b/glsa-200707-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-04">
<title>GNU C Library: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with escalated privileges.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>July 03, 2007</announced>
- <revised>July 03, 2007: 01</revised>
+ <announced>2007-07-03</announced>
+ <revised>2007-07-03: 01</revised>
<bug>183844</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/glibc-2.5-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/glibc-2.5-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508">CVE-2007-3508</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508">CVE-2007-3508</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 01 Jul 2007 18:20:09 +0000">
+ <metadata tag="submitter" timestamp="2007-07-01T18:20:09Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jul 2007 13:34:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-03T13:34:58Z">
taviso
</metadata>
</glsa>
diff --git a/glsa-200707-05.xml b/glsa-200707-05.xml
index a2e6f8c5..49cb6cb7 100644
--- a/glsa-200707-05.xml
+++ b/glsa-200707-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-05">
<title>Webmin, Usermin: Cross-site scripting vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS).
</synopsis>
<product type="ebuild">webmin/usermin</product>
- <announced>July 05, 2007</announced>
- <revised>July 05, 2007: 01</revised>
+ <announced>2007-07-05</announced>
+ <revised>2007-07-05: 01</revised>
<bug>181385</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/webmin-1.350&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/webmin-1.350"</code>
<p>
All Usermin users should update to the latest stable version:
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/usermin-1.280&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/usermin-1.280"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3156">CVE-2007-3156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3156">CVE-2007-3156</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 19:12:36 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T19:12:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Jun 2007 13:33:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-29T13:33:55Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-06.xml b/glsa-200707-06.xml
index fbdae35e..6d719a37 100644
--- a/glsa-200707-06.xml
+++ b/glsa-200707-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-06">
<title>XnView: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution when handling XPM image files.
</synopsis>
<product type="ebuild">xnview</product>
- <announced>July 11, 2007</announced>
- <revised>July 11, 2007: 01</revised>
+ <announced>2007-07-11</announced>
+ <revised>2007-07-11: 01</revised>
<bug>175670</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --unmerge xnview</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2194">CVE-2007-2194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2194">CVE-2007-2194</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jul 2007 10:38:47 +0000">
+ <metadata tag="requester" timestamp="2007-07-01T10:38:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jul 2007 18:12:51 +0000">
+ <metadata tag="submitter" timestamp="2007-07-02T18:12:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Jul 2007 19:39:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-11T19:39:42Z">
DerCorny
</metadata>
</glsa>
diff --git a/glsa-200707-07.xml b/glsa-200707-07.xml
index 73bd6482..57e12748 100644
--- a/glsa-200707-07.xml
+++ b/glsa-200707-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-07">
<title>MPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>July 24, 2007</announced>
- <revised>October 12, 2007: 03</revised>
+ <announced>2007-07-24</announced>
+ <revised>2007-10-12: 03</revised>
<bug>181097</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20070622&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20070622"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948">CVE-2007-2948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948">CVE-2007-2948</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:30:30 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:30:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:47:22 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:47:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:48:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:48:15Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-08.xml b/glsa-200707-08.xml
index 59198620..ac2f8bf2 100644
--- a/glsa-200707-08.xml
+++ b/glsa-200707-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-08">
<title>NVClock: Insecure file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">nvclock</product>
- <announced>July 24, 2007</announced>
- <revised>July 24, 2007: 01</revised>
+ <announced>2007-07-24</announced>
+ <revised>2007-07-24: 01</revised>
<bug>184071</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/nvclock-0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/nvclock-0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3531">CVE-2007-3531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3531">CVE-2007-3531</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 09:48:09 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T09:48:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:59:19 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:59:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:59:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:59:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-09.xml b/glsa-200707-09.xml
index 9cba5cae..b443d764 100644
--- a/glsa-200707-09.xml
+++ b/glsa-200707-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-09">
<title>GIMP: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>182047</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519">CVE-2006-4519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949">CVE-2007-2949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519">CVE-2006-4519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949">CVE-2007-2949</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Jul 2007 20:14:16 +0000">
+ <metadata tag="requester" timestamp="2007-07-11T20:14:16Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:21:17 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:21:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:21:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:21:44Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-10.xml b/glsa-200707-10.xml
index c9cfb542..ea61a987 100644
--- a/glsa-200707-10.xml
+++ b/glsa-200707-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-10">
<title>Festival: Privilege elevation</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">festival</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>170477</bug>
<access>local</access>
<affected>
@@ -48,13 +47,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-accessibility/festival-1.95_beta-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-accessibility/festival-1.95_beta-r4"</code>
</resolution>
<references/>
- <metadata tag="submitter" timestamp="Wed, 25 Jul 2007 09:41:45 +0000">
+ <metadata tag="submitter" timestamp="2007-07-25T09:41:45Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 21:25:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T21:25:25Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200707-11.xml b/glsa-200707-11.xml
index 58f05328..b14c1847 100644
--- a/glsa-200707-11.xml
+++ b/glsa-200707-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-11">
<title>MIT Kerberos 5: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
remote code execution with root privileges by unauthenticated users.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>183338</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442">CVE-2007-2442</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443">CVE-2007-2443</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798">CVE-2007-2798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442">CVE-2007-2442</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443">CVE-2007-2443</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798">CVE-2007-2798</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:39:18 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:39:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jul 2007 20:11:47 +0000">
+ <metadata tag="submitter" timestamp="2007-07-16T20:11:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 17:56:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T17:56:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200707-12.xml b/glsa-200707-12.xml
index 06a6468f..2addc1b5 100644
--- a/glsa-200707-12.xml
+++ b/glsa-200707-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-12">
<title>VLC media player: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>July 28, 2007</announced>
- <revised>July 28, 2007: 01</revised>
+ <announced>2007-07-28</announced>
+ <revised>2007-07-28: 01</revised>
<bug>182389</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6c&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6c"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316">CVE-2007-3316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316">CVE-2007-3316</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 21:42:20 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T21:42:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:31:02 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:31:02Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:31:47 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:31:47Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-13.xml b/glsa-200707-13.xml
index 2d631659..1b15653e 100644
--- a/glsa-200707-13.xml
+++ b/glsa-200707-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-13">
<title>Fail2ban: Denial of Service</title>
<synopsis>
Fail2ban is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>July 28, 2007</announced>
- <revised>January 09, 2008: 02</revised>
+ <announced>2007-07-28</announced>
+ <revised>2008-01-09: 02</revised>
<bug>181214</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/fail2ban-0.8.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/fail2ban-0.8.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321">CVE-2007-4321</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321">CVE-2007-4321</uri>
<uri link="http://www.ossec.net/en/attacking-loganalysis.html#fail2ban">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jul 2007 22:02:25 +0000">
+ <metadata tag="requester" timestamp="2007-07-03T22:02:25Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:12:05 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:12:05Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:13:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:13:27Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200707-14.xml b/glsa-200707-14.xml
index 65326483..f016916f 100644
--- a/glsa-200707-14.xml
+++ b/glsa-200707-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-14">
<title>tcpdump: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code, possibly with root privileges.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>July 28, 2007</announced>
- <revised>July 28, 2007: 01</revised>
+ <announced>2007-07-28</announced>
+ <revised>2007-07-28: 01</revised>
<bug>184815</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/tcpdump-3.9.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/tcpdump-3.9.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798">CVE-2007-3798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798">CVE-2007-3798</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 22:01:53 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T22:01:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:00:19 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:00:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:48:59Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-01.xml b/glsa-200708-01.xml
index 940b1fc6..9851391f 100644
--- a/glsa-200708-01.xml
+++ b/glsa-200708-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-01">
<title>Macromedia Flash Player: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>August 08, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-08-08</announced>
+ <revised>2009-05-28: 02</revised>
<bug>185141</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.48.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.48.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022">CVE-2007-2022</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456">CVE-2007-3456</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457">CVE-2007-3457</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022">CVE-2007-2022</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456">CVE-2007-3456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457">CVE-2007-3457</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:35:19 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T10:35:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Jul 2007 09:40:21 +0000">
+ <metadata tag="submitter" timestamp="2007-07-24T09:40:21Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Jul 2007 09:40:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-24T09:40:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-02.xml b/glsa-200708-02.xml
index 6ee5a856..7223f813 100644
--- a/glsa-200708-02.xml
+++ b/glsa-200708-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-02">
<title>Xvid: Array indexing vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">xvid</product>
- <announced>August 08, 2007</announced>
- <revised>August 08, 2007: 01</revised>
+ <announced>2007-08-08</announced>
+ <revised>2007-08-08: 01</revised>
<bug>183145</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xvid-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xvid-1.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3329">CVE-2007-3329</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3329">CVE-2007-3329</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 21:54:33 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T21:54:33Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:56:27 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:56:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jul 2007 07:58:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-16T07:58:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-03.xml b/glsa-200708-03.xml
index 9ba6d631..e30733ef 100644
--- a/glsa-200708-03.xml
+++ b/glsa-200708-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-03">
<title>libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>August 08, 2007</announced>
- <revised>August 08, 2007: 02</revised>
+ <announced>2007-08-08</announced>
+ <revised>2007-08-08: 02</revised>
<bug>184984</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/libarchive-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/libarchive-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641">CVE-2007-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644">CVE-2007-3644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645">CVE-2007-3645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641">CVE-2007-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644">CVE-2007-3644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645">CVE-2007-3645</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:30:41 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T10:30:41Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 19:19:38 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T19:19:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 17:56:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T17:56:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200708-04.xml b/glsa-200708-04.xml
index ba0f3aeb..1a8af2e7 100644
--- a/glsa-200708-04.xml
+++ b/glsa-200708-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-04">
<title>ClamAV: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 09, 2007</announced>
- <revised>August 09, 2007: 01</revised>
+ <announced>2007-08-09</announced>
+ <revised>2007-08-09: 01</revised>
<bug>185013</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725">CVE-2007-3725</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725">CVE-2007-3725</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:16:39 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:16:39Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Aug 2007 17:18:26 +0000">
+ <metadata tag="submitter" timestamp="2007-08-04T17:18:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Aug 2007 17:18:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-04T17:18:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-05.xml b/glsa-200708-05.xml
index d8372757..90fd6adb 100644
--- a/glsa-200708-05.xml
+++ b/glsa-200708-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-05">
<title>GD: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gd</product>
- <announced>August 09, 2007</announced>
- <revised>August 09, 2007: 01</revised>
+ <announced>2007-08-09</announced>
+ <revised>2007-08-09: 01</revised>
<bug>179154</bug>
<access>remote</access>
<affected>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gd-2.0.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.35"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472">CVE-2007-3472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473">CVE-2007-3473</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3474">CVE-2007-3474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475">CVE-2007-3475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476">CVE-2007-3476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477">CVE-2007-3477</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478">CVE-2007-3478</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472">CVE-2007-3472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473">CVE-2007-3473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3474">CVE-2007-3474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475">CVE-2007-3475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476">CVE-2007-3476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477">CVE-2007-3477</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478">CVE-2007-3478</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Jul 2007 21:01:20 +0000">
+ <metadata tag="requester" timestamp="2007-07-20T21:01:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Jul 2007 09:13:14 +0000">
+ <metadata tag="submitter" timestamp="2007-07-31T09:13:14Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Jul 2007 09:13:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-31T09:13:30Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-06.xml b/glsa-200708-06.xml
index 5b5d6a01..bd726530 100644
--- a/glsa-200708-06.xml
+++ b/glsa-200708-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-06">
<title>Net::DNS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for a Denial of Service and a cache poisoning attack.
</synopsis>
<product type="ebuild">net-dns</product>
- <announced>August 11, 2007</announced>
- <revised>August 11, 2007: 01</revised>
+ <announced>2007-08-11</announced>
+ <revised>2007-08-11: 01</revised>
<bug>184029</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Net-DNS-0.60&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Net-DNS-0.60"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377">CVE-2007-3377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409">CVE-2007-3409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377">CVE-2007-3377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409">CVE-2007-3409</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jul 2007 13:12:37 +0000">
+ <metadata tag="requester" timestamp="2007-07-16T13:12:37Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:32:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:32:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jul 2007 09:51:53 +0000">
+ <metadata tag="submitter" timestamp="2007-07-30T09:51:53Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-07.xml b/glsa-200708-07.xml
index 5c8d5176..a41391f4 100644
--- a/glsa-200708-07.xml
+++ b/glsa-200708-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-07">
<title>Xfce Terminal: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">terminal</product>
- <announced>August 11, 2007</announced>
- <revised>July 12, 2008: 02</revised>
+ <announced>2007-08-11</announced>
+ <revised>2008-07-12: 02</revised>
<bug>184886</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/terminal-0.2.6_p25931&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/terminal-0.2.6_p25931"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770">CVE-2007-3770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770">CVE-2007-3770</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Jul 2007 07:40:26 +0000">
+ <metadata tag="requester" timestamp="2007-07-28T07:40:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 28 Jul 2007 07:40:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-28T07:40:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Jul 2007 08:48:45 +0000">
+ <metadata tag="submitter" timestamp="2007-07-31T08:48:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-08.xml b/glsa-200708-08.xml
index 510d6082..c61e3f35 100644
--- a/glsa-200708-08.xml
+++ b/glsa-200708-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-08">
<title>SquirrelMail G/PGP plugin: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>August 11, 2007</announced>
- <revised>August 11, 2007: 01</revised>
+ <announced>2007-08-11</announced>
+ <revised>2007-08-11: 01</revised>
<bug>185010</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.10a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.10a-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1924">CVE-2005-1924</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4169">CVE-2006-4169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1924">CVE-2005-1924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4169">CVE-2006-4169</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Jul 2007 20:59:21 +0000">
+ <metadata tag="requester" timestamp="2007-07-20T20:59:21Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Jul 2007 13:21:57 +0000">
+ <metadata tag="submitter" timestamp="2007-07-23T13:21:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Jul 2007 13:22:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-23T13:22:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-09.xml b/glsa-200708-09.xml
index 34b4ff88..1d6587f5 100644
--- a/glsa-200708-09.xml
+++ b/glsa-200708-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-09">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox,mozilla-firefox-bin,seamonkey,seamonkey-bin,mozilla-thunderbird,mozilla-thunderbird-bin,xulrunner</product>
- <announced>August 14, 2007</announced>
- <revised>August 14, 2007: 01</revised>
+ <announced>2007-08-14</announced>
+ <revised>2007-08-14: 01</revised>
<bug>185737</bug>
<bug>187205</bug>
<access>remote</access>
@@ -90,62 +89,62 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.6"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.6"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.6"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.6"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.4"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.4"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089">CVE-2007-3089</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656">CVE-2007-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734">CVE-2007-3734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735">CVE-2007-3735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736">CVE-2007-3736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737">CVE-2007-3737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738">CVE-2007-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844">CVE-2007-3844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089">CVE-2007-3089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656">CVE-2007-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734">CVE-2007-3734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735">CVE-2007-3735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736">CVE-2007-3736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737">CVE-2007-3737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738">CVE-2007-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844">CVE-2007-3844</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Aug 2007 10:45:13 +0000">
+ <metadata tag="requester" timestamp="2007-08-05T10:45:13Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Aug 2007 10:48:05 +0000">
+ <metadata tag="submitter" timestamp="2007-08-05T10:48:05Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Aug 2007 16:40:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-14T16:40:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-10.xml b/glsa-200708-10.xml
index 568dbdc1..cae5aac2 100644
--- a/glsa-200708-10.xml
+++ b/glsa-200708-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-10">
<title>MySQL: Denial of Service and information leakage</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability were found in MySQL.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>185333</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.44&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.44"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780">CVE-2007-3780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781">CVE-2007-3781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780">CVE-2007-3780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781">CVE-2007-3781</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:18:26 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:18:26Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:12:02 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:12:02Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Aug 2007 20:13:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-12T20:13:00Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200708-11.xml b/glsa-200708-11.xml
index 13fab843..d20f4a3f 100644
--- a/glsa-200708-11.xml
+++ b/glsa-200708-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-11">
<title>Lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and potentially the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>185442</bug>
<access>remote</access>
<affected>
@@ -51,22 +50,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3946">CVE-2007-3946</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3947">CVE-2007-3947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3948">CVE-2007-3948</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3949">CVE-2007-3949</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3950">CVE-2007-3950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3946">CVE-2007-3946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3947">CVE-2007-3947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3948">CVE-2007-3948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3949">CVE-2007-3949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3950">CVE-2007-3950</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jul 2007 18:07:17 +0000">
+ <metadata tag="requester" timestamp="2007-07-17T18:07:17Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 21:28:06 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T21:28:06Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 05:43:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T05:43:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200708-12.xml b/glsa-200708-12.xml
index 8a64e4ef..173f5ec0 100644
--- a/glsa-200708-12.xml
+++ b/glsa-200708-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-12">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>183520</bug>
<access>remote</access>
<affected>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389">CVE-2007-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390">CVE-2007-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391">CVE-2007-3391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392">CVE-2007-3392</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393">CVE-2007-3393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389">CVE-2007-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390">CVE-2007-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391">CVE-2007-3391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392">CVE-2007-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393">CVE-2007-3393</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jul 2007 10:55:17 +0000">
+ <metadata tag="requester" timestamp="2007-07-24T10:55:17Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:32:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:32:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:22:11 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:22:11Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-13.xml b/glsa-200708-13.xml
index 5913cd88..200dd821 100644
--- a/glsa-200708-13.xml
+++ b/glsa-200708-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-13">
<title>BIND: Weak random number generation</title>
<synopsis>
@@ -8,8 +7,8 @@
easier to guess the next query ID and perform a DNS cache poisoning attack.
</synopsis>
<product type="ebuild">bind</product>
- <announced>August 18, 2007</announced>
- <revised>August 18, 2007: 01</revised>
+ <announced>2007-08-18</announced>
+ <revised>2007-08-18: 01</revised>
<bug>186556</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.1_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.1_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925">CVE-2007-2925</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926">CVE-2007-2926</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925">CVE-2007-2925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926">CVE-2007-2926</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Aug 2007 10:40:49 +0000">
+ <metadata tag="requester" timestamp="2007-08-05T10:40:49Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 13 Aug 2007 23:06:16 +0000">
+ <metadata tag="submitter" timestamp="2007-08-13T23:06:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Aug 2007 23:00:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-14T23:00:40Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200708-14.xml b/glsa-200708-14.xml
index 7ebda5a1..642ce2ce 100644
--- a/glsa-200708-14.xml
+++ b/glsa-200708-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-14">
<title>NVIDIA drivers: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
for a Denial of Service.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>August 19, 2007</announced>
- <revised>October 11, 2007: 03</revised>
+ <announced>2007-08-19</announced>
+ <revised>2007-10-11: 03</revised>
<bug>183567</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;x11-drivers/nvidia-drivers&quot;</code>
+ # emerge --ask --oneshot --verbose "x11-drivers/nvidia-drivers"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3532">CVE-2007-3532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3532">CVE-2007-3532</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Jul 2007 07:38:56 +0000">
+ <metadata tag="requester" timestamp="2007-07-28T07:38:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 28 Jul 2007 07:39:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-28T07:39:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:41:51 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:41:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-15.xml b/glsa-200708-15.xml
index 9a1c34b0..2cde52f3 100644
--- a/glsa-200708-15.xml
+++ b/glsa-200708-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-15">
<title>Apache mod_jk: Directory traversal</title>
<synopsis>
A directory traversal vulnerability has been discovered in Apache mod_jk.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>August 19, 2007</announced>
- <revised>August 19, 2007: 01</revised>
+ <announced>2007-08-19</announced>
+ <revised>2007-08-19: 01</revised>
<bug>186218</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">CVE-2007-1860</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">CVE-2007-1860</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:06:43 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:06:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jul 2007 22:08:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-29T22:08:30Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 21:01:34 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T21:01:34Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200708-16.xml b/glsa-200708-16.xml
index 9034265a..97b6013a 100644
--- a/glsa-200708-16.xml
+++ b/glsa-200708-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-16">
<title>Qt: Multiple format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code in some Qt applications.
</synopsis>
<product type="ebuild">qt</product>
- <announced>August 22, 2007</announced>
- <revised>August 22, 2007: 01</revised>
+ <announced>2007-08-22</announced>
+ <revised>2007-08-22: 01</revised>
<bug>185446</bug>
<access>remote, local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=x11-libs/qt-3*&quot;</code>
+ # emerge --ask --oneshot --verbose "=x11-libs/qt-3*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388">CVE-2007-3388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388">CVE-2007-3388</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Aug 2007 17:25:28 +0000">
+ <metadata tag="requester" timestamp="2007-08-15T17:25:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 17:25:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T17:25:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Aug 2007 22:38:33 +0000">
+ <metadata tag="submitter" timestamp="2007-08-19T22:38:33Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200708-17.xml b/glsa-200708-17.xml
index ae88c4c0..d277f106 100644
--- a/glsa-200708-17.xml
+++ b/glsa-200708-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-17">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>August 22, 2007</announced>
- <revised>August 22, 2007: 01</revised>
+ <announced>2007-08-22</announced>
+ <revised>2007-08-22: 01</revised>
<bug>185497</bug>
<bug>188987</bug>
<access>remote</access>
@@ -59,22 +58,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3142">CVE-2007-3142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819">CVE-2007-3819</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929">CVE-2007-3929</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4367">CVE-2007-4367</uri>
- <uri link="http://www.opera.com/support/search/view/861/">Opera Advisory 861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3142">CVE-2007-3142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819">CVE-2007-3819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929">CVE-2007-3929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4367">CVE-2007-4367</uri>
+ <uri link="https://www.opera.com/support/search/view/861/">Opera Advisory 861</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 20:48:46 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T20:48:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jul 2007 20:48:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-29T20:48:57Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 09:59:22 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T09:59:22Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200709-01.xml b/glsa-200709-01.xml
index 3508fc00..e0c14818 100644
--- a/glsa-200709-01.xml
+++ b/glsa-200709-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-01">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote unauthenticated user to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>September 11, 2007</announced>
- <revised>September 11, 2007: 01</revised>
+ <announced>2007-09-11</announced>
+ <revised>2007-09-11: 01</revised>
<bug>191301</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000">CVE-2007-4000</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000">CVE-2007-4000</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:29:04 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:29:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 19:22:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T19:22:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Sep 2007 18:34:17 +0000">
+ <metadata tag="submitter" timestamp="2007-09-10T18:34:17Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200709-02.xml b/glsa-200709-02.xml
index 9225bf72..29887780 100644
--- a/glsa-200709-02.xml
+++ b/glsa-200709-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-02">
<title>KVIrc: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">kvirc</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>183174</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/kvirc-3.2.6_pre20070714&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/kvirc-3.2.6_pre20070714"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2951">CVE-2007-2951</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2951">CVE-2007-2951</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Aug 2007 14:12:16 +0000">
+ <metadata tag="requester" timestamp="2007-08-06T14:12:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Aug 2007 18:59:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-19T18:59:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 11:26:17 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T11:26:17Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-03.xml b/glsa-200709-03.xml
index 4cc73a99..a5c627d9 100644
--- a/glsa-200709-03.xml
+++ b/glsa-200709-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-03">
<title>Streamripper: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>188698</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.62.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.62.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4337">CVE-2007-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4337">CVE-2007-4337</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Aug 2007 09:30:52 +0000">
+ <metadata tag="requester" timestamp="2007-08-24T09:30:52Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Aug 2007 09:31:49 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-24T09:31:49Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Sep 2007 15:35:27 +0000">
+ <metadata tag="submitter" timestamp="2007-09-08T15:35:27Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-04.xml b/glsa-200709-04.xml
index 788b657e..7d7725a1 100644
--- a/glsa-200709-04.xml
+++ b/glsa-200709-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-04">
<title>po4a: Insecure temporary file creation</title>
<synopsis>
A vulnerability has been discovered in po4a, allowing for a symlink attack.
</synopsis>
<product type="ebuild">po4a</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>189440</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/po4a-0.32-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/po4a-0.32-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462">CVE-2007-4462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462">CVE-2007-4462</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Aug 2007 20:28:00 +0000">
+ <metadata tag="requester" timestamp="2007-08-28T20:28:00Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Aug 2007 20:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-28T20:28:12Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Sep 2007 16:20:41 +0000">
+ <metadata tag="submitter" timestamp="2007-09-08T16:20:41Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-05.xml b/glsa-200709-05.xml
index 606a7fa7..a43e61c7 100644
--- a/glsa-200709-05.xml
+++ b/glsa-200709-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-05">
<title>RealPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>September 14, 2007</announced>
- <revised>September 14, 2007: 01</revised>
+ <announced>2007-09-14</announced>
+ <revised>2007-09-14: 01</revised>
<bug>183421</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410">CVE-2007-3410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410">CVE-2007-3410</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:19:49 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T10:19:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 10:19:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T10:19:58Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Sep 2007 20:21:51 +0000">
+ <metadata tag="submitter" timestamp="2007-09-09T20:21:51Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200709-06.xml b/glsa-200709-06.xml
index b7aa98b6..0d1afd51 100644
--- a/glsa-200709-06.xml
+++ b/glsa-200709-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-06">
<title>flac123: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">flac123</product>
- <announced>September 14, 2007</announced>
- <revised>September 14, 2007: 01</revised>
+ <announced>2007-09-14</announced>
+ <revised>2007-09-14: 01</revised>
<bug>186220</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/flac123-0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/flac123-0.0.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507">CVE-2007-3507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507">CVE-2007-3507</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:21:26 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T10:21:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 11:36:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T11:36:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Sep 2007 15:39:45 +0000">
+ <metadata tag="submitter" timestamp="2007-09-11T15:39:45Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200709-07.xml b/glsa-200709-07.xml
index 253ff531..20582a6d 100644
--- a/glsa-200709-07.xml
+++ b/glsa-200709-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-07">
<title>Eggdrop: Buffer overflow</title>
<synopsis>
A remote stack-based buffer overflow has been discovered in Eggdrop.
</synopsis>
<product type="ebuild">eggdrop</product>
- <announced>September 15, 2007</announced>
- <revised>September 26, 2007: 02</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-26: 02</revised>
<bug>179354</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/eggdrop-1.6.18-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/eggdrop-1.6.18-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807">CVE-2007-2807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807">CVE-2007-2807</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Aug 2007 09:04:09 +0000">
+ <metadata tag="requester" timestamp="2007-08-23T09:04:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Aug 2007 09:04:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-23T09:04:22Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Sep 2007 09:43:27 +0000">
+ <metadata tag="submitter" timestamp="2007-09-07T09:43:27Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-08.xml b/glsa-200709-08.xml
index 430cacc1..bdb954f1 100644
--- a/glsa-200709-08.xml
+++ b/glsa-200709-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-08">
<title>id3lib: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">id3lib</product>
- <announced>September 15, 2007</announced>
- <revised>September 15, 2007: 01</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-15: 01</revised>
<bug>189610</bug>
<access>local</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/id3lib-3.8.3-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/id3lib-3.8.3-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460">CVE-2007-4460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460">CVE-2007-4460</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 20:50:09 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T20:50:09Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Sep 2007 08:35:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-14T08:35:20Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200709-09.xml b/glsa-200709-09.xml
index 9f89f86f..8c6732c7 100644
--- a/glsa-200709-09.xml
+++ b/glsa-200709-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-09">
<title>GNU Tar: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in GNU Tar.
</synopsis>
<product type="ebuild">tar</product>
- <announced>September 15, 2007</announced>
- <revised>September 15, 2007: 01</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-15: 01</revised>
<bug>189682</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.18-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131">CVE-2007-4131</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131">CVE-2007-4131</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 18:11:35 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T18:11:35Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Sep 2007 18:49:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-13T18:49:13Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200709-10.xml b/glsa-200709-10.xml
index aa63a105..e89ed3ee 100644
--- a/glsa-200709-10.xml
+++ b/glsa-200709-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-10">
<title>PhpWiki: Authentication bypass</title>
<synopsis>
A vulnerability has been discovered in PhpWiki authentication mechanism.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>September 18, 2007</announced>
- <revised>September 18, 2007: 01</revised>
+ <announced>2007-09-18</announced>
+ <revised>2007-09-18: 01</revised>
<bug>181692</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3193">CVE-2007-3193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3193">CVE-2007-3193</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2007 23:41:27 +0000">
+ <metadata tag="requester" timestamp="2007-09-04T23:41:27Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 16:22:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T16:22:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 20:54:32 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T20:54:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-11.xml b/glsa-200709-11.xml
index ac74f0b1..dfd76503 100644
--- a/glsa-200709-11.xml
+++ b/glsa-200709-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-11">
<title>GDM: Local Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
displays.
</synopsis>
<product type="ebuild">gdm</product>
- <announced>September 18, 2007</announced>
- <revised>September 18, 2007: 01</revised>
+ <announced>2007-09-18</announced>
+ <revised>2007-09-18: 01</revised>
<bug>187919</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;gnome-base/gdm&quot;</code>
+ # emerge --ask --oneshot --verbose "gnome-base/gdm"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3381">CVE-2007-3381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3381">CVE-2007-3381</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Aug 2007 05:40:23 +0000">
+ <metadata tag="requester" timestamp="2007-08-15T05:40:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 05:40:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T05:40:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 09:31:53 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T09:31:53Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200709-12.xml b/glsa-200709-12.xml
index 0bd9deb5..867b4a2c 100644
--- a/glsa-200709-12.xml
+++ b/glsa-200709-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-12">
<title>Poppler: Two buffer overflow vulnerabilities</title>
<synopsis>
Poppler is vulnerable to an integer overflow and a stack overflow.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>September 19, 2007</announced>
- <revised>September 19, 2007: 01</revised>
+ <announced>2007-09-19</announced>
+ <revised>2007-09-19: 01</revised>
<bug>188863</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.5.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.5.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 12:44:56 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T12:44:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 12:45:03 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T12:45:03Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 01 Sep 2007 13:10:32 +0000">
+ <metadata tag="submitter" timestamp="2007-09-01T13:10:32Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200709-13.xml b/glsa-200709-13.xml
index c7a6f182..c7a04a37 100644
--- a/glsa-200709-13.xml
+++ b/glsa-200709-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-13">
<title>rsync: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
rsync.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>September 20, 2007</announced>
- <revised>September 20, 2007: 01</revised>
+ <announced>2007-09-20</announced>
+ <revised>2007-09-20: 01</revised>
<bug>189132</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.9-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.9-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091">CVE-2007-4091</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091">CVE-2007-4091</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:30:02 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:30:02Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 00:00:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T00:00:07Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 16:04:37 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T16:04:37Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-14.xml b/glsa-200709-14.xml
index 1b15c0e8..0c3cd426 100644
--- a/glsa-200709-14.xml
+++ b/glsa-200709-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-14">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code and Denial of Service attacks.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 20, 2007</announced>
- <revised>September 20, 2007: 01</revised>
+ <announced>2007-09-20</announced>
+ <revised>2007-09-20: 01</revised>
<bug>189912</bug>
<access>remote</access>
<affected>
@@ -58,16 +57,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510">CVE-2007-4510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560">CVE-2007-4560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510">CVE-2007-4510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560">CVE-2007-4560</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Sep 2007 22:57:24 +0000">
+ <metadata tag="submitter" timestamp="2007-09-14T22:57:24Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Sep 2007 12:07:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-15T12:07:22Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-15.xml b/glsa-200709-15.xml
index b05d860d..c4cb541c 100644
--- a/glsa-200709-15.xml
+++ b/glsa-200709-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-15">
<title>BEA JRockit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">jrockit-jdk-bin</product>
- <announced>September 23, 2007</announced>
- <revised>September 23, 2007: 01</revised>
+ <announced>2007-09-23</announced>
+ <revised>2007-09-23: 01</revised>
<bug>190686</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.5.0.11_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.5.0.11_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004">CVE-2007-3004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005">CVE-2007-3005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3503">CVE-2007-3503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698">CVE-2007-3698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3716">CVE-2007-3716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922">CVE-2007-3922</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4381">CVE-2007-4381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004">CVE-2007-3004</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005">CVE-2007-3005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3503">CVE-2007-3503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698">CVE-2007-3698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3716">CVE-2007-3716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922">CVE-2007-3922</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4381">CVE-2007-4381</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 21:57:11 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T21:57:11Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 12:51:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T12:51:05Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200709-16.xml b/glsa-200709-16.xml
index 34ceeeff..18755bc0 100644
--- a/glsa-200709-16.xml
+++ b/glsa-200709-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-16">
<title>Lighttpd: Buffer overflow</title>
<synopsis>
Lighttpd is vulnerable to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>September 27, 2007</announced>
- <revised>September 27, 2007: 01</revised>
+ <announced>2007-09-27</announced>
+ <revised>2007-09-27: 01</revised>
<bug>191912</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.18"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 21:10:23 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T21:10:23Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 21:10:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T21:10:32Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Sep 2007 16:06:46 +0000">
+ <metadata tag="submitter" timestamp="2007-09-22T16:06:46Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-17.xml b/glsa-200709-17.xml
index a6f48818..4a5cc13f 100644
--- a/glsa-200709-17.xml
+++ b/glsa-200709-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-17">
<title>teTeX: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>September 27, 2007</announced>
- <revised>September 27, 2007: 01</revised>
+ <announced>2007-09-27</announced>
+ <revised>2007-09-27: 01</revised>
<bug>170861</bug>
<bug>182055</bug>
<bug>188172</bug>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-3.0_p1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-3.0_p1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650">CVE-2007-0650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA-200708-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650">CVE-2007-0650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA-200708-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 15:34:16 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T15:34:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Sep 2007 14:17:49 +0000">
+ <metadata tag="submitter" timestamp="2007-09-22T14:17:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Sep 2007 21:28:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-27T21:28:55Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200709-18.xml b/glsa-200709-18.xml
index d37eb46a..3817c89f 100644
--- a/glsa-200709-18.xml
+++ b/glsa-200709-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-18">
<title>Bugzilla: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>September 30, 2007</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2007-09-30</announced>
+ <revised>2009-05-28: 03</revised>
<bug>190112</bug>
<access>remote</access>
<affected>
@@ -67,17 +66,17 @@
# emerge --ask --oneshot --verbose www-apps/bugzilla</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4538">CVE-2007-4538</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4539">CVE-2007-4539</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4543">CVE-2007-4543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4538">CVE-2007-4538</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4539">CVE-2007-4539</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4543">CVE-2007-4543</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Sep 2007 09:19:32 +0000">
+ <metadata tag="requester" timestamp="2007-09-12T09:19:32Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 16:25:04 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T16:25:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Sep 2007 08:36:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-14T08:36:10Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200710-01.xml b/glsa-200710-01.xml
index 4c65f822..c646111c 100644
--- a/glsa-200710-01.xml
+++ b/glsa-200710-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-01">
<title>RPCSEC_GSS library: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in librpcsecgss.
</synopsis>
<product type="ebuild">librcpsecgss</product>
- <announced>October 04, 2007</announced>
- <revised>October 04, 2007: 01</revised>
+ <announced>2007-10-04</announced>
+ <revised>2007-10-04: 01</revised>
<bug>191479</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/librpcsecgss-0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/librpcsecgss-0.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
- <uri link="/security/en/glsa/glsa-200709-01.xml">GLSA-200709-01</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-01.xml">GLSA-200709-01</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Sep 2007 19:27:24 +0000">
+ <metadata tag="requester" timestamp="2007-09-09T19:27:24Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 19:29:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T19:29:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2007 15:36:52 +0000">
+ <metadata tag="submitter" timestamp="2007-09-29T15:36:52Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-02.xml b/glsa-200710-02.xml
index d434b93e..78050bdd 100644
--- a/glsa-200710-02.xml
+++ b/glsa-200710-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-02">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>179158</bug>
<bug>180556</bug>
<bug>191034</bug>
@@ -108,45 +107,45 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.4_p20070914-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.4_p20070914-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883">CVE-2007-1883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887">CVE-2007-1887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872">CVE-2007-2872</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007">CVE-2007-3007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378">CVE-2007-3378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806">CVE-2007-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996">CVE-2007-3996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997">CVE-2007-3997</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998">CVE-2007-3998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652">CVE-2007-4652</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657">CVE-2007-4657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658">CVE-2007-4658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659">CVE-2007-4659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660">CVE-2007-4660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661">CVE-2007-4661</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662">CVE-2007-4662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663">CVE-2007-4663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670">CVE-2007-4670</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782">CVE-2007-4782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783">CVE-2007-4783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784">CVE-2007-4784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825">CVE-2007-4825</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840">CVE-2007-4840</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887">CVE-2007-4887</uri>
- <uri link="/security/en/glsa/glsa-200705-19.xml">GLSA 200705-19</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883">CVE-2007-1883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887">CVE-2007-1887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872">CVE-2007-2872</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007">CVE-2007-3007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378">CVE-2007-3378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806">CVE-2007-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996">CVE-2007-3996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997">CVE-2007-3997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998">CVE-2007-3998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652">CVE-2007-4652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657">CVE-2007-4657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658">CVE-2007-4658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659">CVE-2007-4659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660">CVE-2007-4660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661">CVE-2007-4661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662">CVE-2007-4662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663">CVE-2007-4663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670">CVE-2007-4670</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782">CVE-2007-4782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783">CVE-2007-4783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784">CVE-2007-4784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825">CVE-2007-4825</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840">CVE-2007-4840</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887">CVE-2007-4887</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-19.xml">GLSA 200705-19</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Aug 2007 18:58:47 +0000">
+ <metadata tag="requester" timestamp="2007-08-19T18:58:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Aug 2007 18:58:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-19T18:58:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2007 00:18:38 +0000">
+ <metadata tag="submitter" timestamp="2007-09-27T00:18:38Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-03.xml b/glsa-200710-03.xml
index c19c7d3a..3f1bf716 100644
--- a/glsa-200710-03.xml
+++ b/glsa-200710-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-03">
<title>libvorbis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered in libvorbis.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>186716</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106">CVE-2007-3106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029">CVE-2007-4029</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065">CVE-2007-4065</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066">CVE-2007-4066</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106">CVE-2007-3106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029">CVE-2007-4029</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065">CVE-2007-4065</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066">CVE-2007-4066</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2007 23:57:53 +0000">
+ <metadata tag="requester" timestamp="2007-09-04T23:57:53Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 16:21:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T16:21:39Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 15:39:27 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T15:39:27Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-04.xml b/glsa-200710-04.xml
index 003dd4d9..0453780a 100644
--- a/glsa-200710-04.xml
+++ b/glsa-200710-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-04">
<title>libsndfile: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in libsndfile.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>192834</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974">CVE-2007-4974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974">CVE-2007-4974</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Oct 2007 23:14:31 +0000">
+ <metadata tag="requester" timestamp="2007-10-06T23:14:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 18:26:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T18:26:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 07 Oct 2007 19:16:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-07T19:16:11Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-05.xml b/glsa-200710-05.xml
index 6b41b0b3..5b064f1f 100644
--- a/glsa-200710-05.xml
+++ b/glsa-200710-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-05">
<title>QGit: Insecure temporary file creation</title>
<synopsis>
@@ -9,8 +8,8 @@
rights.
</synopsis>
<product type="ebuild">qgit</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>190697</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/qgit-1.5.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/qgit-1.5.7"</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4631">CVE-2007-4631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4631">CVE-2007-4631</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Sep 2007 08:55:56 +0000">
+ <metadata tag="requester" timestamp="2007-09-24T08:55:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Sep 2007 08:56:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-24T08:56:46Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 18:55:10 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T18:55:10Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-06.xml b/glsa-200710-06.xml
index c2b9a089..5e7089f3 100644
--- a/glsa-200710-06.xml
+++ b/glsa-200710-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-06">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability have been discovered in OpenSSL.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>188799</bug>
<bug>194039</bug>
<access>local, remote</access>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8e-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8e-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108">CVE-2007-3108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135">CVE-2007-5135</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108">CVE-2007-3108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135">CVE-2007-5135</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Sep 2007 06:24:11 +0000">
+ <metadata tag="requester" timestamp="2007-09-10T06:24:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Sep 2007 06:24:24 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-10T06:24:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Oct 2007 13:14:06 +0000">
+ <metadata tag="submitter" timestamp="2007-10-06T13:14:06Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-07.xml b/glsa-200710-07.xml
index dbbab17b..e56484f8 100644
--- a/glsa-200710-07.xml
+++ b/glsa-200710-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-07">
<title>Tk: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Tk.
</synopsis>
<product type="ebuild">tk</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>192539</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/tk-8.4.15-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/tk-8.4.15-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4851">CVE-2007-4851</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4851">CVE-2007-4851</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 09:49:33 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T09:49:33Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 09:49:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T09:49:45Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 20:07:14 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T20:07:14Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-08.xml b/glsa-200710-08.xml
index 068cb65f..9e4ebc3f 100644
--- a/glsa-200710-08.xml
+++ b/glsa-200710-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-08">
<title>KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow.
</synopsis>
<product type="ebuild">koffice, kword, kdegraphics, kpdf</product>
- <announced>October 09, 2007</announced>
- <revised>October 09, 2007: 01</revised>
+ <announced>2007-10-09</announced>
+ <revised>2007-10-09: 01</revised>
<bug>187139</bug>
<access>remote</access>
<affected>
@@ -63,36 +62,36 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.6.3-r1"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.6.3-r1"</code>
<p>
All KDE Graphics Libraries users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.5.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.5.7-r1"</code>
<p>
All KPDF users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.5.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.5.7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:26:21 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:26:21Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 23:59:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T23:59:58Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 16:13:55 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T16:13:55Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200710-09.xml b/glsa-200710-09.xml
index 2b8fa942..4f586ba1 100644
--- a/glsa-200710-09.xml
+++ b/glsa-200710-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-09">
<title>NX 2.1: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow vulnerability.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>October 09, 2007</announced>
- <revised>October 09, 2007: 01</revised>
+ <announced>2007-10-09</announced>
+ <revised>2007-10-09: 01</revised>
<bug>192712</bug>
<access>remote</access>
<affected>
@@ -56,25 +55,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.0.0"</code>
<p>
All NX Node users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.0.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.0.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
- <uri link="/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 13:00:55 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T13:00:55Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 13:01:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T13:01:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 16:18:36 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T16:18:36Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-10.xml b/glsa-200710-10.xml
index a2786c28..ab94373e 100644
--- a/glsa-200710-10.xml
+++ b/glsa-200710-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-10">
<title>SKK Tools: Insecure temporary file creation</title>
<synopsis>
SKK insecurely creates temporary files.
</synopsis>
<product type="ebuild">skktools</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>193121</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/skktools-1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/skktools-1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3916">CVE-2007-3916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3916">CVE-2007-3916</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 19:17:24 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T19:17:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 19:18:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T19:18:40Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 20:45:18 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T20:45:18Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200710-11.xml b/glsa-200710-11.xml
index 59aad364..f90d7fc6 100644
--- a/glsa-200710-11.xml
+++ b/glsa-200710-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-11">
<title>X Font Server: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing local attackers to gain elevated privileges.
</synopsis>
<product type="ebuild">xfs</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>185660</bug>
<bug>194606</bug>
<access>local</access>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xfs-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xfs-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3103">CVE-2007-3103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568">CVE-2007-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990">CVE-2007-4990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3103">CVE-2007-3103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568">CVE-2007-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990">CVE-2007-4990</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 20:30:03 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T20:30:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Oct 2007 21:39:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-11T21:39:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Oct 2007 21:39:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-11T21:39:34Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-12.xml b/glsa-200710-12.xml
index e2017674..7b6de094 100644
--- a/glsa-200710-12.xml
+++ b/glsa-200710-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-12">
<title>T1Lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">t1lib</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>193437</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/t1lib-5.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/t1lib-5.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033">CVE-2007-4033</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033">CVE-2007-4033</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 12:38:38 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T12:38:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 12:39:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T12:39:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:05:38 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:05:38Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-13.xml b/glsa-200710-13.xml
index 85faa280..c963a9ad 100644
--- a/glsa-200710-13.xml
+++ b/glsa-200710-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-13">
<title>Ampache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered in Ampache.
</synopsis>
<product type="ebuild">ampache</product>
- <announced>October 13, 2007</announced>
- <revised>October 13, 2007: 01</revised>
+ <announced>2007-10-13</announced>
+ <revised>2007-10-13: 01</revised>
<bug>189607</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/ampache-3.3.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/ampache-3.3.3.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4437">CVE-2007-4437</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4438">CVE-2007-4438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4437">CVE-2007-4437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4438">CVE-2007-4438</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Sep 2007 21:08:28 +0000">
+ <metadata tag="requester" timestamp="2007-09-17T21:08:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 21:08:38 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T21:08:38Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 19:57:29 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T19:57:29Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-14.xml b/glsa-200710-14.xml
index 40613350..5d8e8b51 100644
--- a/glsa-200710-14.xml
+++ b/glsa-200710-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-14">
<title>DenyHosts: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service.
</synopsis>
<product type="ebuild">denyhosts</product>
- <announced>October 13, 2007</announced>
- <revised>October 13, 2007: 01</revised>
+ <announced>2007-10-13</announced>
+ <revised>2007-10-13: 01</revised>
<bug>181213</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/denyhosts-2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/denyhosts-2.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4323">CVE-2007-4323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4323">CVE-2007-4323</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Oct 2007 13:32:04 +0000">
+ <metadata tag="requester" timestamp="2007-10-06T13:32:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Oct 2007 13:32:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-06T13:32:42Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 22:16:56 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T22:16:56Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200710-15.xml b/glsa-200710-15.xml
index cb190168..ced0e1c0 100644
--- a/glsa-200710-15.xml
+++ b/glsa-200710-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-15">
<title>KDM: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to gain elevated privileges.
</synopsis>
<product type="ebuild">KDM</product>
- <announced>October 14, 2007</announced>
- <revised>October 14, 2007: 01</revised>
+ <announced>2007-10-14</announced>
+ <revised>2007-10-14: 01</revised>
<bug>192373</bug>
<access>local</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdm-3.5.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdm-3.5.7-r2"</code>
<p>
All kdebase users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdebase-3.5.7-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdebase-3.5.7-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569">CVE-2007-4569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569">CVE-2007-4569</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Oct 2007 00:34:30 +0000">
+ <metadata tag="requester" timestamp="2007-10-08T00:34:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:49:35 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:49:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Oct 2007 02:58:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-08T02:58:05Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-16.xml b/glsa-200710-16.xml
index 7cfd9b1f..16977722 100644
--- a/glsa-200710-16.xml
+++ b/glsa-200710-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-16">
<title>X.Org X server: Composite local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
X server, allowing for a local privilege escalation.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>October 14, 2007</announced>
- <revised>October 14, 2007: 01</revised>
+ <announced>2007-10-14</announced>
+ <revised>2007-10-14: 01</revised>
<bug>191964</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730">CVE-2007-4730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730">CVE-2007-4730</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Oct 2007 20:35:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-02T20:35:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Oct 2007 20:35:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-02T20:35:33Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:30:05 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:30:05Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-17.xml b/glsa-200710-17.xml
index 30300ea6..c57635af 100644
--- a/glsa-200710-17.xml
+++ b/glsa-200710-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-17">
<title>Balsa: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">balsa</product>
- <announced>October 16, 2007</announced>
- <revised>October 16, 2007: 01</revised>
+ <announced>2007-10-16</announced>
+ <revised>2007-10-16: 01</revised>
<bug>193179</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/balsa-2.3.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/balsa-2.3.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007">CVE-2007-5007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007">CVE-2007-5007</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 14:01:38 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T14:01:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 14:01:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T14:01:46Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:14:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:14:17Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-18.xml b/glsa-200710-18.xml
index c7c13af6..3680908e 100644
--- a/glsa-200710-18.xml
+++ b/glsa-200710-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-18">
<title>util-linux: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>195390</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/util-linux-2.12r-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/util-linux-2.12r-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191">CVE-2007-5191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191">CVE-2007-5191</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Oct 2007 17:17:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-12T17:17:12Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Oct 2007 17:18:23 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-12T17:18:23Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 00:47:53 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T00:47:53Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-19.xml b/glsa-200710-19.xml
index e8a01d92..9230e126 100644
--- a/glsa-200710-19.xml
+++ b/glsa-200710-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-19">
<title>The Sleuth Kit: Integer underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">sleuthkit</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>181977</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-forensics/sleuthkit-2.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-forensics/sleuthkit-2.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
- <uri link="/security/en/glsa/glsa-200703-26.xml">GLSA 200703-26</uri>
- <uri link="/security/en/glsa/glsa-200705-25.xml">GLSA 200705-25</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200703-26.xml">GLSA 200703-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-25.xml">GLSA 200705-25</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Sep 2007 13:59:12 +0000">
+ <metadata tag="requester" timestamp="2007-09-29T13:59:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 13:59:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T13:59:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 23:47:34 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T23:47:34Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-20.xml b/glsa-200710-20.xml
index 4f0d565e..9dbe48f0 100644
--- a/glsa-200710-20.xml
+++ b/glsa-200710-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-20">
<title>PDFKit, ImageKits: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow allowing for the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">pdfkit imagekits</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>188185</bug>
<access>remote</access>
<affected>
@@ -63,16 +62,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Oct 2007 21:24:54 +0000">
+ <metadata tag="requester" timestamp="2007-10-02T21:24:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 23:31:24 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T23:31:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 Oct 2007 18:28:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-09T18:28:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-21.xml b/glsa-200710-21.xml
index f287bb49..3101f1bd 100644
--- a/glsa-200710-21.xml
+++ b/glsa-200710-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-21">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>October 20, 2007</announced>
- <revised>October 20, 2007: 01</revised>
+ <announced>2007-10-20</announced>
+ <revised>2007-10-20: 01</revised>
<bug>195503</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Oct 2007 13:08:51 +0000">
+ <metadata tag="requester" timestamp="2007-10-13T13:08:51Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Oct 2007 22:20:02 +0000">
+ <metadata tag="submitter" timestamp="2007-10-17T22:20:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 18:49:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T18:49:04Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-22.xml b/glsa-200710-22.xml
index e0939e11..b669a0bb 100644
--- a/glsa-200710-22.xml
+++ b/glsa-200710-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-22">
<title>TRAMP: Insecure temporary file creation</title>
<synopsis>
The TRAMP package for GNU Emacs insecurely creates temporary files.
</synopsis>
<product type="ebuild">tramp</product>
- <announced>October 20, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-10-20</announced>
+ <revised>2007-12-30: 02</revised>
<bug>194713</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emacs/tramp-2.1.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emacs/tramp-2.1.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5377">CVE-2007-5377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5377">CVE-2007-5377</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 21:37:14 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T21:37:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2007 20:15:33 +0000">
+ <metadata tag="submitter" timestamp="2007-10-18T20:15:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 20:17:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T20:17:00Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-23.xml b/glsa-200710-23.xml
index 7632b869..6bf8cd24 100644
--- a/glsa-200710-23.xml
+++ b/glsa-200710-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-23">
<title>Star: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in Star.
</synopsis>
<product type="ebuild">star</product>
- <announced>October 22, 2007</announced>
- <revised>October 22, 2007: 01</revised>
+ <announced>2007-10-22</announced>
+ <revised>2007-10-22: 01</revised>
<bug>189690</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/star-1.5_alpha84&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/star-1.5_alpha84"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134">CVE-2007-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134">CVE-2007-4134</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 21:17:08 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T21:17:08Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 01:04:21 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T01:04:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Oct 2007 17:56:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-15T17:56:09Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-24.xml b/glsa-200710-24.xml
index 4ff60d52..d9e0115d 100644
--- a/glsa-200710-24.xml
+++ b/glsa-200710-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-24">
<title>OpenOffice.org: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenOffice.org, allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>October 23, 2007</announced>
- <revised>October 23, 2007: 01</revised>
+ <announced>2007-10-23</announced>
+ <revised>2007-10-23: 01</revised>
<bug>192818</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.3.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834">CVE-2007-2834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834">CVE-2007-2834</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Oct 2007 21:31:00 +0000">
+ <metadata tag="requester" timestamp="2007-10-20T21:31:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 20 Oct 2007 21:31:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-20T21:31:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 10:52:39 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T10:52:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-25.xml b/glsa-200710-25.xml
index 30c88b35..b0ea948e 100644
--- a/glsa-200710-25.xml
+++ b/glsa-200710-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-25">
<title>MLDonkey: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
shell and no password.
</synopsis>
<product type="ebuild">mldonkey</product>
- <announced>October 24, 2007</announced>
- <revised>November 07, 2007: 02</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-11-07: 02</revised>
<bug>189412</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5714">CVE-2007-5714</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5714">CVE-2007-5714</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Sep 2007 16:21:11 +0000">
+ <metadata tag="requester" timestamp="2007-09-10T16:21:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 16:40:51 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T16:40:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 07 Oct 2007 19:26:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-07T19:26:05Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-26.xml b/glsa-200710-26.xml
index 272f09a7..52bf6500 100644
--- a/glsa-200710-26.xml
+++ b/glsa-200710-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-26">
<title>HPLIP: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with root privileges.
</synopsis>
<product type="ebuild">hplip</product>
- <announced>October 24, 2007</announced>
- <revised>October 24, 2007: 01</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-10-24: 01</revised>
<bug>195565</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-print/hplip&quot;</code>
+ # emerge --ask --oneshot --verbose "net-print/hplip"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208">CVE-2007-5208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208">CVE-2007-5208</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Oct 2007 20:50:24 +0000">
+ <metadata tag="requester" timestamp="2007-10-21T20:50:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Oct 2007 20:51:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-21T20:51:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 21:46:02 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T21:46:02Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200710-27.xml b/glsa-200710-27.xml
index a515c2f5..6f145e37 100644
--- a/glsa-200710-27.xml
+++ b/glsa-200710-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-27">
<title>ImageMagick: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in arbitrary code execution or a Denial of Service.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>October 24, 2007</announced>
- <revised>October 24, 2007: 01</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-10-24: 01</revised>
<bug>186030</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.5.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.5.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985">CVE-2007-4985</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986">CVE-2007-4986</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987">CVE-2007-4987</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988">CVE-2007-4988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985">CVE-2007-4985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986">CVE-2007-4986</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987">CVE-2007-4987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988">CVE-2007-4988</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2007 09:56:31 +0000">
+ <metadata tag="requester" timestamp="2007-09-30T09:56:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Oct 2007 12:45:56 +0000">
+ <metadata tag="submitter" timestamp="2007-10-06T12:45:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Oct 2007 14:53:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-23T14:53:02Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200710-28.xml b/glsa-200710-28.xml
index 9cc0ac4d..60ed75fa 100644
--- a/glsa-200710-28.xml
+++ b/glsa-200710-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-28">
<title>Qt: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>October 25, 2007</announced>
- <revised>October 25, 2007: 01</revised>
+ <announced>2007-10-25</announced>
+ <revised>2007-10-25: 01</revised>
<bug>192472</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137">CVE-2007-4137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137">CVE-2007-4137</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Sep 2007 12:11:04 +0000">
+ <metadata tag="requester" timestamp="2007-09-15T12:11:04Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2007 13:54:49 +0000">
+ <metadata tag="submitter" timestamp="2007-09-29T13:54:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 13:54:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T13:54:56Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-29.xml b/glsa-200710-29.xml
index 89604d68..e79ef521 100644
--- a/glsa-200710-29.xml
+++ b/glsa-200710-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-29">
<title>Sylpheed, Claws Mail: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">sylpheed claws-mail</product>
- <announced>October 25, 2007</announced>
- <revised>October 25, 2007: 01</revised>
+ <announced>2007-10-25</announced>
+ <revised>2007-10-25: 01</revised>
<bug>190104</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-2.4.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-2.4.5"</code>
<p>
All Claws Mail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/claws-mail-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/claws-mail-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958">CVE-2007-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958">CVE-2007-2958</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Oct 2007 00:54:19 +0000">
+ <metadata tag="requester" timestamp="2007-10-08T00:54:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Oct 2007 02:57:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-08T02:57:28Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Oct 2007 18:46:46 +0000">
+ <metadata tag="submitter" timestamp="2007-10-09T18:46:46Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200710-30.xml b/glsa-200710-30.xml
index cdd5b328..4b2092e0 100644
--- a/glsa-200710-30.xml
+++ b/glsa-200710-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-30">
<title>OpenSSL: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 27, 2007</announced>
- <revised>October 30, 2007: 03</revised>
+ <announced>2007-10-27</announced>
+ <revised>2007-10-30: 03</revised>
<bug>195634</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8f"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995">CVE-2007-4995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995">CVE-2007-4995</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Oct 2007 17:07:11 +0000">
+ <metadata tag="requester" timestamp="2007-10-16T17:07:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Oct 2007 17:07:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-16T17:07:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Oct 2007 17:06:07 +0000">
+ <metadata tag="submitter" timestamp="2007-10-23T17:06:07Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200710-31.xml b/glsa-200710-31.xml
index 274b6086..497e9755 100644
--- a/glsa-200710-31.xml
+++ b/glsa-200710-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-31">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>October 30, 2007</announced>
- <revised>October 30, 2007: 01</revised>
+ <announced>2007-10-30</announced>
+ <revised>2007-10-30: 01</revised>
<bug>196164</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540">CVE-2007-5540</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541">CVE-2007-5541</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540">CVE-2007-5540</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541">CVE-2007-5541</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 22:07:58 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T22:07:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Oct 2007 21:37:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-22T21:37:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-01.xml b/glsa-200711-01.xml
index f3bb9f39..dcbcb1f8 100644
--- a/glsa-200711-01.xml
+++ b/glsa-200711-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-01">
<title>gFTP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
used in gFTP.
</synopsis>
<product type="ebuild">gftp</product>
- <announced>November 01, 2007</announced>
- <revised>November 01, 2007: 01</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-01: 01</revised>
<bug>188252</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gftp-2.0.18-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gftp-2.0.18-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3961">CVE-2007-3961</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3962">CVE-2007-3962</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3961">CVE-2007-3961</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3962">CVE-2007-3962</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 07:30:16 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T07:30:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 07:30:24 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T07:30:24Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Oct 2007 19:23:34 +0000">
+ <metadata tag="submitter" timestamp="2007-10-10T19:23:34Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-02.xml b/glsa-200711-02.xml
index 448eeee5..708892c0 100644
--- a/glsa-200711-02.xml
+++ b/glsa-200711-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-02">
<title>OpenSSH: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
bypass security restrictions.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>November 01, 2007</announced>
- <revised>November 01, 2007: 01</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-01: 01</revised>
<bug>191321</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752">CVE-2007-4752</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752">CVE-2007-4752</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 19:38:10 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T19:38:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 19:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T19:38:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2007 12:20:41 +0000">
+ <metadata tag="submitter" timestamp="2007-09-28T12:20:41Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-03.xml b/glsa-200711-03.xml
index d77a53fd..751ba2ec 100644
--- a/glsa-200711-03.xml
+++ b/glsa-200711-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-03">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 01, 2007</announced>
- <revised>November 11, 2007: 02</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-11: 02</revised>
<bug>191587</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4650">CVE-2007-4650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4650">CVE-2007-4650</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 09:43:01 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T09:43:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 09:46:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T09:46:35Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 18:31:52 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T18:31:52Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-04.xml b/glsa-200711-04.xml
index 82135bc3..493f62ff 100644
--- a/glsa-200711-04.xml
+++ b/glsa-200711-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-04">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution-data-server</product>
- <announced>November 06, 2007</announced>
- <revised>November 06, 2007: 01</revised>
+ <announced>2007-11-06</announced>
+ <revised>2007-11-06: 01</revised>
<bug>190861</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/evolution-data-server-1.10.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/evolution-data-server-1.10.3.1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200707-03.xml">GLSA 200707-03</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200707-03.xml">GLSA 200707-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Sep 2007 21:12:59 +0000">
+ <metadata tag="requester" timestamp="2007-09-17T21:12:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 21:13:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T21:13:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 19:29:33 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T19:29:33Z">
aetius
</metadata>
</glsa>
diff --git a/glsa-200711-05.xml b/glsa-200711-05.xml
index 90a79c27..15e05638 100644
--- a/glsa-200711-05.xml
+++ b/glsa-200711-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-05">
<title>SiteBar: Multiple issues</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and arbitrary file disclosure.
</synopsis>
<product type="ebuild">sitebar</product>
- <announced>November 06, 2007</announced>
- <revised>November 06, 2007: 01</revised>
+ <announced>2007-11-06</announced>
+ <revised>2007-11-06: 01</revised>
<bug>195810</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/sitebar-3.3.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/sitebar-3.3.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5491">CVE-2007-5491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5492">CVE-2007-5492</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5692">CVE-2007-5692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5693">CVE-2007-5693</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5694">CVE-2007-5694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5695">CVE-2007-5695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5491">CVE-2007-5491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5492">CVE-2007-5492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5692">CVE-2007-5692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5693">CVE-2007-5693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5694">CVE-2007-5694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5695">CVE-2007-5695</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2007 20:00:51 +0000">
+ <metadata tag="submitter" timestamp="2007-10-18T20:00:51Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 20:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T20:01:07Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-06.xml b/glsa-200711-06.xml
index e934ddb3..44391d2e 100644
--- a/glsa-200711-06.xml
+++ b/glsa-200711-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-06">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in a Denial of Service or the disclosure of sensitive information.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>186219</bug>
<access>remote</access>
<affected>
@@ -55,23 +54,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.59-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.59-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752">CVE-2006-5752</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862">CVE-2007-1862</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863">CVE-2007-1863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304">CVE-2007-3304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847">CVE-2007-3847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465">CVE-2007-4465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752">CVE-2006-5752</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862">CVE-2007-1862</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863">CVE-2007-1863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304">CVE-2007-3304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847">CVE-2007-3847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465">CVE-2007-4465</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 14:34:09 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T14:34:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 14:34:48 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T14:34:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 20:07:35 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T20:07:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-07.xml b/glsa-200711-07.xml
index f50183ae..b27acc47 100644
--- a/glsa-200711-07.xml
+++ b/glsa-200711-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-07">
<title>Python: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
Service.
</synopsis>
<product type="ebuild">python</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>192876</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r3"</code>
<p>
All Python 2.4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965">CVE-2007-4965</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965">CVE-2007-4965</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Oct 2007 13:38:30 +0000">
+ <metadata tag="requester" timestamp="2007-10-27T13:38:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Nov 2007 20:41:20 +0000">
+ <metadata tag="submitter" timestamp="2007-11-01T20:41:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Nov 2007 20:41:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-01T20:41:27Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-08.xml b/glsa-200711-08.xml
index 1f4738b9..40402dc1 100644
--- a/glsa-200711-08.xml
+++ b/glsa-200711-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-08">
<title>libpng: Multiple Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
applications that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>195261</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.21-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.21-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5266">CVE-2007-5266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5268">CVE-2007-5268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5266">CVE-2007-5266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5268">CVE-2007-5268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269">CVE-2007-5269</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Oct 2007 09:57:33 +0000">
+ <metadata tag="requester" timestamp="2007-10-20T09:57:33Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 20 Oct 2007 09:57:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-20T09:57:41Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Oct 2007 00:26:03 +0000">
+ <metadata tag="submitter" timestamp="2007-10-26T00:26:03Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-09.xml b/glsa-200711-09.xml
index b229a58a..32d7cd66 100644
--- a/glsa-200711-09.xml
+++ b/glsa-200711-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-09">
<title>MadWifi: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remotely triggered Denial of Service.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>195705</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448">CVE-2007-5448</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448">CVE-2007-5448</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Nov 2007 23:16:45 +0000">
+ <metadata tag="requester" timestamp="2007-11-02T23:16:45Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:18:04 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:18:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:18:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:18:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-10.xml b/glsa-200711-10.xml
index cdfb4ff1..a5242575 100644
--- a/glsa-200711-10.xml
+++ b/glsa-200711-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-10">
<title>Mono: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
that might lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">mono</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>197067</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.2.5.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.2.5.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197">CVE-2007-5197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197">CVE-2007-5197</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:52:57 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:52:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 22:49:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T22:49:37Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-11.xml b/glsa-200711-11.xml
index c8c6c9dd..3f5c86e2 100644
--- a/glsa-200711-11.xml
+++ b/glsa-200711-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-11">
<title>Nagios Plugins: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nagios-plugins</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>196308</bug>
<bug>194178</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-plugins-1.4.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-plugins-1.4.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198">CVE-2007-5198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623">CVE-2007-5623</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198">CVE-2007-5198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623">CVE-2007-5623</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Nov 2007 12:12:46 +0000">
+ <metadata tag="requester" timestamp="2007-11-03T12:12:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Nov 2007 00:16:27 +0000">
+ <metadata tag="submitter" timestamp="2007-11-05T00:16:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 19:12:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T19:12:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200711-12.xml b/glsa-200711-12.xml
index 3b46e4fa..b59d548e 100644
--- a/glsa-200711-12.xml
+++ b/glsa-200711-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-12">
<title>Tomboy: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
a local attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">tomboy</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>189249</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/tomboy-0.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/tomboy-0.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Nov 2007 01:11:29 +0000">
+ <metadata tag="requester" timestamp="2007-11-06T01:11:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Nov 2007 04:11:22 +0000">
+ <metadata tag="submitter" timestamp="2007-11-06T04:11:22Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 Nov 2007 04:11:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-06T04:11:35Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-13.xml b/glsa-200711-13.xml
index 4f09a9c5..8775276a 100644
--- a/glsa-200711-13.xml
+++ b/glsa-200711-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-13">
<title>3proxy: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">3proxy</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>196772</bug>
<access>remote</access>
<affected>
@@ -27,8 +26,8 @@
<description>
<p>
3proxy contains a double free vulnerability in the ftpprchild()
- function, which frees param->hostname and calls the parsehostname()
- function, which in turn attempts to free param->hostname again.
+ function, which frees param-&gt;hostname and calls the parsehostname()
+ function, which in turn attempts to free param-&gt;hostname again.
</p>
</description>
<impact type="normal">
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/3proxy-0.5.3j&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/3proxy-0.5.3j"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5622">CVE-2007-5622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5622">CVE-2007-5622</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Nov 2007 23:15:07 +0000">
+ <metadata tag="requester" timestamp="2007-11-02T23:15:07Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 12:02:00 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T12:02:00Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Nov 2007 14:26:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-04T14:26:02Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-14.xml b/glsa-200711-14.xml
index af18f6bf..e14ec867 100644
--- a/glsa-200711-14.xml
+++ b/glsa-200711-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-14">
<title>Mozilla Firefox, SeaMonkey, XULRunner: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and XULRunner, potentially allowing to compromise a user's system.
</synopsis>
<product type="ebuild">firefox seamonkey xulrunner</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>196480</bug>
<access>remote</access>
<affected>
@@ -77,49 +76,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.9"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.9"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.6"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.6"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095">CVE-2007-1095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292">CVE-2007-2292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334">CVE-2007-5334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5335">CVE-2007-5335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337">CVE-2007-5337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338">CVE-2007-5338</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095">CVE-2007-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292">CVE-2007-2292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334">CVE-2007-5334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5335">CVE-2007-5335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337">CVE-2007-5337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338">CVE-2007-5338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Oct 2007 22:27:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-24T22:27:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Oct 2007 23:05:04 +0000">
+ <metadata tag="submitter" timestamp="2007-10-25T23:05:04Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Nov 2007 21:08:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-12T21:08:46Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-15.xml b/glsa-200711-15.xml
index 493bdcf1..1ea49e53 100644
--- a/glsa-200711-15.xml
+++ b/glsa-200711-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-15">
<title>FLAC: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code.
</synopsis>
<product type="ebuild">flac</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>195700</bug>
<access>remote</access>
<affected>
@@ -51,7 +50,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/flac-1.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/flac-1.2.1-r1"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend
on older versions of FLAC:
@@ -60,15 +59,15 @@
# revdep-rebuild --library=libFLAC.*</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619">CVE-2007-4619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619">CVE-2007-4619</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Nov 2007 19:12:08 +0000">
+ <metadata tag="requester" timestamp="2007-11-01T19:12:08Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Nov 2007 03:25:37 +0000">
+ <metadata tag="submitter" timestamp="2007-11-02T03:25:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:19:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:19:45Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-16.xml b/glsa-200711-16.xml
index cad29aee..2a310047 100644
--- a/glsa-200711-16.xml
+++ b/glsa-200711-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-16">
<title>CUPS: Memory corruption</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cups</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>196736</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351">CVE-2007-4351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351">CVE-2007-4351</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 04 Nov 2007 00:16:24 +0000">
+ <metadata tag="submitter" timestamp="2007-11-04T00:16:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Nov 2007 08:38:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-11T08:38:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200711-17.xml b/glsa-200711-17.xml
index b312cfb1..966522c8 100644
--- a/glsa-200711-17.xml
+++ b/glsa-200711-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-17">
<title>Ruby on Rails: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure and theft of user credentials.
</synopsis>
<product type="ebuild">rails</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>195315</bug>
<bug>182223</bug>
<access>remote</access>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-1.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-1.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227">CVE-2007-3227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5379">CVE-2007-5379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227">CVE-2007-3227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5379">CVE-2007-5379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 08:24:34 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T08:24:34Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 20:49:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T20:49:09Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Nov 2007 19:31:01 +0000">
+ <metadata tag="submitter" timestamp="2007-11-09T19:31:01Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-18.xml b/glsa-200711-18.xml
index 8caa9075..11385fb4 100644
--- a/glsa-200711-18.xml
+++ b/glsa-200711-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-18">
<title>Cpio: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>196978</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/cpio-2.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/cpio-2.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476">CVE-2007-4476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476">CVE-2007-4476</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:52:13 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T19:52:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 20:48:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T20:48:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Nov 2007 18:58:10 +0000">
+ <metadata tag="submitter" timestamp="2007-11-08T18:58:10Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200711-19.xml b/glsa-200711-19.xml
index 2bc7e008..684f4bc4 100644
--- a/glsa-200711-19.xml
+++ b/glsa-200711-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-19">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>195503</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.8.3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200710-21.xml">GLSA 200710-21</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5682">CVE-2007-5682</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-21.xml">GLSA 200710-21</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5682">CVE-2007-5682</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Oct 2007 13:39:33 +0000">
+ <metadata tag="requester" timestamp="2007-10-27T13:39:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:20:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:20:18Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 23:14:54 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T23:14:54Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-20.xml b/glsa-200711-20.xml
index d1f00e3a..372ad78f 100644
--- a/glsa-200711-20.xml
+++ b/glsa-200711-20.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-20">
<title>Pioneers: Multiple Denials of Service</title>
<synopsis>
Two Denial of Service vulnerabilities were discovered in Pioneers.
</synopsis>
<product type="ebuild">pioneers</product>
- <announced>November 14, 2007</announced>
- <revised>November 29, 2007: 04</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-29: 04</revised>
<bug>198807</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-board/pioneers-0.11.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-board/pioneers-0.11.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5933">CVE-2007-5933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6010">CVE-2007-6010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5933">CVE-2007-5933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6010">CVE-2007-6010</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Nov 2007 15:28:52 +0000">
+ <metadata tag="requester" timestamp="2007-11-11T15:28:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Nov 2007 22:49:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-13T22:49:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 23:00:46 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T23:00:46Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-21.xml b/glsa-200711-21.xml
index feeca8ab..a5c7fe4f 100644
--- a/glsa-200711-21.xml
+++ b/glsa-200711-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-21">
<title>Bochs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">bochs</product>
- <announced>November 17, 2007</announced>
- <revised>November 17, 2007: 01</revised>
+ <announced>2007-11-17</announced>
+ <revised>2007-11-17: 01</revised>
<bug>188148</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/bochs-2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/bochs-2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2893">CVE-2007-2893</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2894">CVE-2007-2894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2893">CVE-2007-2893</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2894">CVE-2007-2894</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Sep 2007 14:10:20 +0000">
+ <metadata tag="requester" timestamp="2007-09-29T14:10:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 14:11:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T14:11:15Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Nov 2007 20:22:24 +0000">
+ <metadata tag="submitter" timestamp="2007-11-01T20:22:24Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-22.xml b/glsa-200711-22.xml
index c186fa32..c75f42fa 100644
--- a/glsa-200711-22.xml
+++ b/glsa-200711-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-22">
<title>Poppler, KDE: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
management issues possibly resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler koffice kword kdegraphics kpdf</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196735</bug>
<bug>198409</bug>
<access>remote</access>
@@ -78,41 +77,41 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.1-r1"</code>
<p>
All KPDF users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.5.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.5.7-r3"</code>
<p>
All KDE Graphics Libraries users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.5.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.5.7-r3"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.6.3-r2"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.6.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352">CVE-2007-4352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392">CVE-2007-5392</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393">CVE-2007-5393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352">CVE-2007-4352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392">CVE-2007-5392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393">CVE-2007-5393</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 00:47:07 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T00:47:07Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 00:30:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T00:30:13Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-23.xml b/glsa-200711-23.xml
index 63fcb9c2..9317f246 100644
--- a/glsa-200711-23.xml
+++ b/glsa-200711-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-23">
<title>VMware Workstation and Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
elevated privileges on the host operating system through multiple flaws.
</synopsis>
<product type="ebuild">vmware-workstation vmware-player</product>
- <announced>November 18, 2007</announced>
- <revised>April 16, 2008: 03</revised>
+ <announced>2007-11-18</announced>
+ <revised>2008-04-16: 03</revised>
<bug>193196</bug>
<access>remote</access>
<affected>
@@ -71,40 +70,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-workstation-5.5.5.56455&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-workstation-5.5.5.56455"</code>
<p>
All VMware Player users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-player-1.0.5.56455&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-player-1.0.5.56455"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0813">CVE-2004-0813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619">CVE-2006-3619</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146">CVE-2006-4146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600">CVE-2006-4600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0061">CVE-2007-0061</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0063">CVE-2007-0063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716">CVE-2007-1716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4496">CVE-2007-4496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4497">CVE-2007-4497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5617">CVE-2007-5617</uri>
- <uri link="/security/en/glsa/glsa-200606-02.xml">GLSA-200606-02</uri>
- <uri link="/security/en/glsa/glsa-200702-06.xml">GLSA-200702-06</uri>
- <uri link="/security/en/glsa/glsa-200704-11.xml">GLSA-200704-11</uri>
- <uri link="/security/en/glsa/glsa-200705-15.xml">GLSA-200705-15</uri>
- <uri link="/security/en/glsa/glsa-200707-11.xml">GLSA-200707-11</uri>
- <uri link="http://lists.vmware.com/pipermail/security-announce/2007/000001.html">VMSA-2007-0006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0813">CVE-2004-0813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619">CVE-2006-3619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146">CVE-2006-4146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600">CVE-2006-4600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0061">CVE-2007-0061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0063">CVE-2007-0063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716">CVE-2007-1716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4496">CVE-2007-4496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4497">CVE-2007-4497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5617">CVE-2007-5617</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200606-02.xml">GLSA-200606-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200702-06.xml">GLSA-200702-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-11.xml">GLSA-200704-11</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-15.xml">GLSA-200705-15</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200707-11.xml">GLSA-200707-11</uri>
+ <uri link="https://lists.vmware.com/pipermail/security-announce/2007/000001.html">VMSA-2007-0006</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 01:24:32 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T01:24:32Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 02:06:33 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T02:06:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Nov 2007 23:43:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-15T23:43:42Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-24.xml b/glsa-200711-24.xml
index ee209ec3..e426cb25 100644
--- a/glsa-200711-24.xml
+++ b/glsa-200711-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-24">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-thunderbird mozilla-thunderbird-bin</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196481</bug>
<access>remote</access>
<affected>
@@ -54,27 +53,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.9"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
- <uri link="/security/en/glsa/glsa-200711-14.xml">GLSA 200711-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-14.xml">GLSA 200711-14</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 13:53:08 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T13:53:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Nov 2007 19:54:39 +0000">
+ <metadata tag="submitter" timestamp="2007-11-18T19:54:39Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 19:58:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T19:58:25Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-25.xml b/glsa-200711-25.xml
index e0a570c3..e7784034 100644
--- a/glsa-200711-25.xml
+++ b/glsa-200711-25.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-25">
<title>MySQL: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was found in MySQL.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>198988</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.44-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.44-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925">CVE-2007-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925">CVE-2007-5925</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 14:18:51 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T14:18:51Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Nov 2007 20:09:52 +0000">
+ <metadata tag="submitter" timestamp="2007-11-18T20:09:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 20:10:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T20:10:13Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-26.xml b/glsa-200711-26.xml
index 675d71ad..b16e125c 100644
--- a/glsa-200711-26.xml
+++ b/glsa-200711-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-26">
<title>teTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or overwrite arbitrary files.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>198238</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-3.0_p1-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-3.0_p1-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935">CVE-2007-5935</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936">CVE-2007-5936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937">CVE-2007-5937</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935">CVE-2007-5935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936">CVE-2007-5936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937">CVE-2007-5937</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 01:13:42 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T01:13:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 21:46:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T21:46:32Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-27.xml b/glsa-200711-27.xml
index d33d2907..6e90d53e 100644
--- a/glsa-200711-27.xml
+++ b/glsa-200711-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-27">
<title>Link Grammar: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Link Grammar.
</synopsis>
<product type="ebuild">link-grammar</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196803</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/link-grammar-4.2.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/link-grammar-4.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5395">CVE-2007-5395</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5395">CVE-2007-5395</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Nov 2007 17:43:19 +0000">
+ <metadata tag="requester" timestamp="2007-11-14T17:43:19Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Nov 2007 19:29:25 +0000">
+ <metadata tag="submitter" timestamp="2007-11-17T19:29:25Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Nov 2007 19:29:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-17T19:29:34Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-28.xml b/glsa-200711-28.xml
index 1a5db8b7..4644c748 100644
--- a/glsa-200711-28.xml
+++ b/glsa-200711-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-28">
<title>Perl: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">perl</product>
- <announced>November 19, 2007</announced>
- <revised>November 19, 2007: 01</revised>
+ <announced>2007-11-19</announced>
+ <revised>2007-11-19: 01</revised>
<bug>198196</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/perl-5.8.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/perl-5.8.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116">CVE-2007-5116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116">CVE-2007-5116</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Nov 2007 01:27:30 +0000">
+ <metadata tag="requester" timestamp="2007-11-14T01:27:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 Nov 2007 00:34:08 +0000">
+ <metadata tag="submitter" timestamp="2007-11-15T00:34:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 14:24:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T14:24:28Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-29.xml b/glsa-200711-29.xml
index 7c0b86ee..4f918b80 100644
--- a/glsa-200711-29.xml
+++ b/glsa-200711-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-29">
<title>Samba: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>November 20, 2007</announced>
- <revised>December 05, 2007: 03</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-12-05: 03</revised>
<bug>197519</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.27a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.27a"</code>
<p>
The first vulnerability (CVE-2007-5398) was already fixed in Samba
3.0.26a-r2.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:37:14 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:37:14Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Nov 2007 21:13:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-20T21:13:02Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-30.xml b/glsa-200711-30.xml
index 9d2ba082..5a39d34d 100644
--- a/glsa-200711-30.xml
+++ b/glsa-200711-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-30">
<title>PCRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, possibly leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libpcre</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198198</bug>
<access>remote</access>
<affected>
@@ -74,27 +73,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227">CVE-2006-7227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230">CVE-2006-7230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659">CVE-2007-1659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660">CVE-2007-1660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661">CVE-2007-1661</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662">CVE-2007-1662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766">CVE-2007-4766</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767">CVE-2007-4767</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227">CVE-2006-7227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230">CVE-2006-7230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659">CVE-2007-1659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660">CVE-2007-1660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661">CVE-2007-1661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662">CVE-2007-1662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766">CVE-2007-4766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767">CVE-2007-4767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Nov 2007 10:23:13 +0000">
+ <metadata tag="requester" timestamp="2007-11-09T10:23:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Nov 2007 00:43:59 +0000">
+ <metadata tag="submitter" timestamp="2007-11-20T00:43:59Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Nov 2007 00:44:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-20T00:44:04Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-31.xml b/glsa-200711-31.xml
index 415f98ff..45602831 100644
--- a/glsa-200711-31.xml
+++ b/glsa-200711-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-31">
<title>Net-SNMP: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
processing GETBULK requests.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198346</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846">CVE-2007-5846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846">CVE-2007-5846</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 22:35:11 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T22:35:11Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 22:35:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T22:35:17Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 Nov 2007 21:51:55 +0000">
+ <metadata tag="submitter" timestamp="2007-11-19T21:51:55Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200711-32.xml b/glsa-200711-32.xml
index cf680c83..2bd89716 100644
--- a/glsa-200711-32.xml
+++ b/glsa-200711-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-32">
<title>Feynmf: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">feynmf</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198231</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-tex/feynmf-1.08-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-tex/feynmf-1.08-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5940">CVE-2007-5940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5940">CVE-2007-5940</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Nov 2007 21:43:28 +0000">
+ <metadata tag="requester" timestamp="2007-11-19T21:43:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 21:44:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T21:44:51Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Nov 2007 00:07:40 +0000">
+ <metadata tag="submitter" timestamp="2007-11-20T00:07:40Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-33.xml b/glsa-200711-33.xml
index a3d5aa28..beacfb3e 100644
--- a/glsa-200711-33.xml
+++ b/glsa-200711-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-33">
<title>nss_ldap: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure in services using nss_ldap.
</synopsis>
<product type="ebuild">nss_ldap</product>
- <announced>November 25, 2007</announced>
- <revised>November 25, 2007: 01</revised>
+ <announced>2007-11-25</announced>
+ <revised>2007-11-25: 01</revised>
<bug>198390</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/nss_ldap-258&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/nss_ldap-258"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794">CVE-2007-5794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794">CVE-2007-5794</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 15:50:09 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T15:50:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 15:50:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T15:50:16Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Nov 2007 00:25:43 +0000">
+ <metadata tag="submitter" timestamp="2007-11-21T00:25:43Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200711-34.xml b/glsa-200711-34.xml
index 6703b461..9eaec70c 100644
--- a/glsa-200711-34.xml
+++ b/glsa-200711-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-34">
<title>CSTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code or overwrite arbitrary files.
</synopsis>
<product type="ebuild">cstetex</product>
- <announced>November 25, 2007</announced>
- <revised>November 25, 2007: 01</revised>
+ <announced>2007-11-25</announced>
+ <revised>2007-11-25: 01</revised>
<bug>196673</bug>
<access>remote</access>
<affected>
@@ -56,17 +55,17 @@
</p>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
- <uri link="/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
- <uri link="/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 00:12:34 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T00:12:34Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 21:14:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T21:14:43Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-01.xml b/glsa-200712-01.xml
index db52f0f7..2ba28a2f 100644
--- a/glsa-200712-01.xml
+++ b/glsa-200712-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-01">
<title>Hugin: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">hugin</product>
- <announced>December 05, 2007</announced>
- <revised>December 05, 2007: 01</revised>
+ <announced>2007-12-05</announced>
+ <revised>2007-12-05: 01</revised>
<bug>195996</bug>
<access>local</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/hugin-0.6.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/hugin-0.6.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200">CVE-2007-5200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200">CVE-2007-5200</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 17 Nov 2007 23:47:03 +0000">
+ <metadata tag="submitter" timestamp="2007-11-17T23:47:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Nov 2007 23:47:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-17T23:47:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-02.xml b/glsa-200712-02.xml
index c9d53ae8..ea93f2c6 100644
--- a/glsa-200712-02.xml
+++ b/glsa-200712-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-02">
<title>Cacti: SQL injection</title>
<synopsis>
An SQL injection vulnerability has been discovered in Cacti.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>December 05, 2007</announced>
- <revised>December 05, 2007: 02</revised>
+ <announced>2007-12-05</announced>
+ <revised>2007-12-05: 02</revised>
<bug>199509</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6j-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6j-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035">CVE-2007-6035</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035">CVE-2007-6035</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 22:34:20 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T22:34:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Dec 2007 22:34:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-02T22:34:29Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Dec 2007 22:01:32 +0000">
+ <metadata tag="submitter" timestamp="2007-12-04T22:01:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-03.xml b/glsa-200712-03.xml
index d0b0835b..931dca8a 100644
--- a/glsa-200712-03.xml
+++ b/glsa-200712-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-03">
<title>GNU Emacs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">emacs</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>197958</bug>
<bug>200297</bug>
<access>remote</access>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-22.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-22.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795">CVE-2007-5795</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109">CVE-2007-6109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795">CVE-2007-5795</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109">CVE-2007-6109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Nov 2007 22:12:50 +0000">
+ <metadata tag="requester" timestamp="2007-11-20T22:12:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:01:27 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:01:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Dec 2007 13:59:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-07T13:59:32Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-04.xml b/glsa-200712-04.xml
index ada35c08..21b6e779 100644
--- a/glsa-200712-04.xml
+++ b/glsa-200712-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-04">
<title>Cairo: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">cairo</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>200350</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/cairo-1.4.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/cairo-1.4.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503">CVE-2007-5503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503">CVE-2007-5503</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2007 23:43:52 +0000">
+ <metadata tag="requester" timestamp="2007-12-04T23:43:52Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:36:20 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:36:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Dec 2007 01:36:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-05T01:36:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-05.xml b/glsa-200712-05.xml
index b5c582d5..83366ba3 100644
--- a/glsa-200712-05.xml
+++ b/glsa-200712-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-05">
<title>PEAR::MDB2: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">PEAR-MDB2</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>198446</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-MDB2-2.5.0_alpha1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-MDB2-2.5.0_alpha1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5934">CVE-2007-5934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5934">CVE-2007-5934</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 12:32:27 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T12:32:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:58:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:58:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Dec 2007 01:59:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-05T01:59:26Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-06.xml b/glsa-200712-06.xml
index b33f311b..b9f40514 100644
--- a/glsa-200712-06.xml
+++ b/glsa-200712-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-06">
<title>Firebird: Multiple buffer overflows</title>
<synopsis>
Multiple stack-based buffer overflows were discovered in Firebird.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>195569</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992">CVE-2007-4992</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5246">CVE-2007-5246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992">CVE-2007-4992</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5246">CVE-2007-5246</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Nov 2007 11:24:49 +0000">
+ <metadata tag="requester" timestamp="2007-11-28T11:24:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Nov 2007 00:06:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-29T00:06:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Dec 2007 23:26:04 +0000">
+ <metadata tag="submitter" timestamp="2007-12-08T23:26:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-07.xml b/glsa-200712-07.xml
index 2aa7dee4..4e6c6fd8 100644
--- a/glsa-200712-07.xml
+++ b/glsa-200712-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-07">
<title>Lookup: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">lookup</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>197306</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emacs/lookup-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emacs/lookup-1.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0237">CVE-2007-0237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0237">CVE-2007-0237</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Nov 2007 22:00:43 +0000">
+ <metadata tag="requester" timestamp="2007-11-19T22:00:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Nov 2007 00:09:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-21T00:09:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Dec 2007 23:10:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-08T23:10:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-08.xml b/glsa-200712-08.xml
index 6206cd3f..b062d045 100644
--- a/glsa-200712-08.xml
+++ b/glsa-200712-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-08">
<title>AMD64 x86 emulation Qt library: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code in Qt applications.
</synopsis>
<product type="ebuild">emul-linux-x86-qtlibs</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>189536</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-qtlibs-20071114-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-qtlibs-20071114-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-16.xml">GLSA 200708-16</uri>
- <uri link="/security/en/glsa/glsa-200710-28.xml">GLSA 200710-28</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-16.xml">GLSA 200708-16</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-28.xml">GLSA 200710-28</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 12:28:12 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T12:28:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Dec 2007 19:55:14 +0000">
+ <metadata tag="submitter" timestamp="2007-12-09T19:55:14Z">
welp
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Dec 2007 20:04:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-09T20:04:39Z">
welp
</metadata>
</glsa>
diff --git a/glsa-200712-09.xml b/glsa-200712-09.xml
index 4d28d095..947a7c1c 100644
--- a/glsa-200712-09.xml
+++ b/glsa-200712-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-09">
<title>Ruby-GNOME2: Format string error</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">ruby-gtk2</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>200623</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/ruby-gtk2-0.16.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/ruby-gtk2-0.16.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6183">CVE-2007-6183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6183">CVE-2007-6183</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2007 18:00:54 +0000">
+ <metadata tag="requester" timestamp="2007-12-04T18:00:54Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Dec 2007 22:24:59 +0000">
+ <metadata tag="submitter" timestamp="2007-12-04T22:24:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Dec 2007 22:25:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-04T22:25:12Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-10.xml b/glsa-200712-10.xml
index 3143629a..9d27f172 100644
--- a/glsa-200712-10.xml
+++ b/glsa-200712-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-10">
<title>Samba: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>December 10, 2007</announced>
- <revised>December 10, 2007: 01</revised>
+ <announced>2007-12-10</announced>
+ <revised>2007-12-10: 01</revised>
<bug>200773</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 10 Dec 2007 02:00:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-10T02:00:00Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 19:33:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T19:33:11Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-11.xml b/glsa-200712-11.xml
index 0406eca4..e5a9f5a2 100644
--- a/glsa-200712-11.xml
+++ b/glsa-200712-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-11">
<title>Portage: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">portage</product>
- <announced>December 13, 2007</announced>
- <revised>December 13, 2007: 01</revised>
+ <announced>2007-12-13</announced>
+ <revised>2007-12-13: 01</revised>
<bug>193589</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.1.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.1.3.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6249">CVE-2007-6249</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6249">CVE-2007-6249</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Dec 2007 21:27:57 +0000">
+ <metadata tag="requester" timestamp="2007-12-10T21:27:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 21:28:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T21:28:40Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Dec 2007 22:39:19 +0000">
+ <metadata tag="submitter" timestamp="2007-12-11T22:39:19Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-12.xml b/glsa-200712-12.xml
index 6bef7328..479c4d42 100644
--- a/glsa-200712-12.xml
+++ b/glsa-200712-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-12">
<title>IRC Services: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in IRC Services.
</synopsis>
<product type="ebuild">ircservices</product>
- <announced>December 13, 2007</announced>
- <revised>December 13, 2007: 01</revised>
+ <announced>2007-12-13</announced>
+ <revised>2007-12-13: 01</revised>
<bug>199897</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ircservices-5.0.63&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ircservices-5.0.63"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6122">CVE-2007-6122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6122">CVE-2007-6122</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Dec 2007 21:48:10 +0000">
+ <metadata tag="requester" timestamp="2007-12-10T21:48:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 21:51:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T21:51:02Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Dec 2007 22:44:42 +0000">
+ <metadata tag="submitter" timestamp="2007-12-11T22:44:42Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-13.xml b/glsa-200712-13.xml
index b442aaf2..99b1328a 100644
--- a/glsa-200712-13.xml
+++ b/glsa-200712-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-13">
<title>E2fsprogs: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>December 18, 2007</announced>
- <revised>December 18, 2007: 01</revised>
+ <announced>2007-12-18</announced>
+ <revised>2007-12-18: 01</revised>
<bug>201546</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/e2fsprogs-1.40.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/e2fsprogs-1.40.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497">CVE-2007-5497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497">CVE-2007-5497</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Dec 2007 09:56:09 +0000">
+ <metadata tag="requester" timestamp="2007-12-12T09:56:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Dec 2007 21:11:04 +0000">
+ <metadata tag="submitter" timestamp="2007-12-13T21:11:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Dec 2007 23:03:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-13T23:03:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-14.xml b/glsa-200712-14.xml
index 6003adef..7f8e612d 100644
--- a/glsa-200712-14.xml
+++ b/glsa-200712-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-14">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>December 18, 2007</announced>
- <revised>December 18, 2007: 01</revised>
+ <announced>2007-12-18</announced>
+ <revised>2007-12-18: 01</revised>
<bug>199195</bug>
<bug>201042</bug>
<bug>201570</bug>
@@ -70,21 +69,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4045">CVE-2007-4045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849">CVE-2007-5849</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6358">CVE-2007-6358</uri>
- <uri link="/security/en/glsa/glsa-200703-28.xml">GLSA 200703-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4045">CVE-2007-4045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849">CVE-2007-5849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6358">CVE-2007-6358</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200703-28.xml">GLSA 200703-28</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Dec 2007 15:44:48 +0000">
+ <metadata tag="requester" timestamp="2007-12-14T15:44:48Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Dec 2007 15:45:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-14T15:45:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Dec 2007 13:31:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-15T13:31:00Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-15.xml b/glsa-200712-15.xml
index 027ab8fd..79c4b4e4 100644
--- a/glsa-200712-15.xml
+++ b/glsa-200712-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-15">
<title>libexif: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202350</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351">CVE-2007-6351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352">CVE-2007-6352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351">CVE-2007-6351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352">CVE-2007-6352</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Dec 2007 23:07:24 +0000">
+ <metadata tag="requester" timestamp="2007-12-21T23:07:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:26:36 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:26:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:21Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-16.xml b/glsa-200712-16.xml
index fc1f5456..ca0087aa 100644
--- a/glsa-200712-16.xml
+++ b/glsa-200712-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-16">
<title>Exiv2: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">exiv2</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202351</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/exiv2-0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/exiv2-0.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353">CVE-2007-6353</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353">CVE-2007-6353</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Dec 2007 23:04:55 +0000">
+ <metadata tag="requester" timestamp="2007-12-21T23:04:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:26:11 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:26:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:25Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-17.xml b/glsa-200712-17.xml
index a9bd3aeb..567c3367 100644
--- a/glsa-200712-17.xml
+++ b/glsa-200712-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-17">
<title>exiftags: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">exiftags</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202354</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/exiftags-1.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/exiftags-1.01"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6354">CVE-2007-6354</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6355">CVE-2007-6355</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6356">CVE-2007-6356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6354">CVE-2007-6354</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6355">CVE-2007-6355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6356">CVE-2007-6356</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Dec 2007 01:37:57 +0000">
+ <metadata tag="requester" timestamp="2007-12-18T01:37:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:27:52 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:27:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:18Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-18.xml b/glsa-200712-18.xml
index 846e16c9..148579fb 100644
--- a/glsa-200712-18.xml
+++ b/glsa-200712-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-18">
<title>Multi-Threaded DAAP Daemon: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Daemon may lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mt-daapd</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>200110</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mt-daapd-0.2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mt-daapd-0.2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824">CVE-2007-5824</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5825">CVE-2007-5825</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824">CVE-2007-5824</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5825">CVE-2007-5825</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Dec 2007 21:05:33 +0000">
+ <metadata tag="requester" timestamp="2007-12-18T21:05:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 20:01:54 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T20:01:54Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 20:02:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T20:02:16Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-19.xml b/glsa-200712-19.xml
index aa22f6b5..b41e8f79 100644
--- a/glsa-200712-19.xml
+++ b/glsa-200712-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-19">
<title>Syslog-ng: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in Syslog-ng.
</synopsis>
<product type="ebuild">syslog-ng</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202718</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437">CVE-2007-6437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437">CVE-2007-6437</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 13:17:29 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T13:17:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Dec 2007 23:09:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-28T23:09:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 23:09:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T23:09:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-20.xml b/glsa-200712-20.xml
index 7b5a9cfc..e9c72125 100644
--- a/glsa-200712-20.xml
+++ b/glsa-200712-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-20">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and Denial of Service attacks.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202762</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335">CVE-2007-6335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336">CVE-2007-6336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337">CVE-2007-6337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335">CVE-2007-6335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336">CVE-2007-6336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337">CVE-2007-6337</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 27 Dec 2007 00:36:49 +0000">
+ <metadata tag="submitter" timestamp="2007-12-27T00:36:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 22:56:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T22:56:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-21.xml b/glsa-200712-21.xml
index a7155b16..2385f2bb 100644
--- a/glsa-200712-21.xml
+++ b/glsa-200712-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-21">
<title>Mozilla Firefox, SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Mozilla Seamonkey.
</synopsis>
<product type="ebuild">firefox seamonkey</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>198965</bug>
<bug>200909</bug>
<access>remote</access>
@@ -65,38 +64,38 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.11"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.11"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.7"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947">CVE-2007-5947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959">CVE-2007-5959</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960">CVE-2007-5960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947">CVE-2007-5947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959">CVE-2007-5959</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960">CVE-2007-5960</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:32:55 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:32:55Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Dec 2007 16:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-12T16:56:13Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Dec 2007 11:43:38 +0000">
+ <metadata tag="submitter" timestamp="2007-12-24T11:43:38Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200712-22.xml b/glsa-200712-22.xml
index b16c7487..095edc0b 100644
--- a/glsa-200712-22.xml
+++ b/glsa-200712-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-22">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and cross domain scripting.
</synopsis>
<product type="ebuild">opera</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>202770</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.25&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.25"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520">CVE-2007-6520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521">CVE-2007-6521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522">CVE-2007-6522</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524">CVE-2007-6524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520">CVE-2007-6520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521">CVE-2007-6521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522">CVE-2007-6522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524">CVE-2007-6524</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 14:34:50 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T14:34:50Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Dec 2007 15:15:57 +0000">
+ <metadata tag="submitter" timestamp="2007-12-22T15:15:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:32:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:32:13Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-23.xml b/glsa-200712-23.xml
index 5f4507f8..5b80997e 100644
--- a/glsa-200712-23.xml
+++ b/glsa-200712-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-23">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>199958</bug>
<access>remote</access>
<affected>
@@ -58,33 +57,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111">CVE-2007-6111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112">CVE-2007-6112</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113">CVE-2007-6113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114">CVE-2007-6114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115">CVE-2007-6115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116">CVE-2007-6116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117">CVE-2007-6117</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118">CVE-2007-6118</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119">CVE-2007-6119</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120">CVE-2007-6120</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121">CVE-2007-6121</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438">CVE-2007-6438</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439">CVE-2007-6439</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441">CVE-2007-6441</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450">CVE-2007-6450</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451">CVE-2007-6451</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111">CVE-2007-6111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112">CVE-2007-6112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113">CVE-2007-6113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114">CVE-2007-6114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115">CVE-2007-6115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116">CVE-2007-6116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117">CVE-2007-6117</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118">CVE-2007-6118</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119">CVE-2007-6119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120">CVE-2007-6120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121">CVE-2007-6121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438">CVE-2007-6438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439">CVE-2007-6439</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441">CVE-2007-6441</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450">CVE-2007-6450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451">CVE-2007-6451</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Dec 2007 11:44:15 +0000">
+ <metadata tag="requester" timestamp="2007-12-26T11:44:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Dec 2007 21:41:40 +0000">
+ <metadata tag="submitter" timestamp="2007-12-29T21:41:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Dec 2007 22:00:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-29T22:00:22Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-24.xml b/glsa-200712-24.xml
index c6cc13e4..cb656f35 100644
--- a/glsa-200712-24.xml
+++ b/glsa-200712-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-24">
<title>AMD64 x86 emulation GTK+ library: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
using Cairo.
</synopsis>
<product type="ebuild">emul-linux-x86-gtklibs</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>201860</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-gtklibs-20071214&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-gtklibs-20071214"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200712-04.xml">GLSA 200712-04</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200712-04.xml">GLSA 200712-04</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 13:50:24 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T13:50:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Dec 2007 22:02:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-29T22:02:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Dec 2007 22:14:56 +0000">
+ <metadata tag="submitter" timestamp="2007-12-29T22:14:56Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200712-25.xml b/glsa-200712-25.xml
index c2bfd4b9..3895f320 100644
--- a/glsa-200712-25.xml
+++ b/glsa-200712-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-25">
<title>OpenOffice.org: User-assisted arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice openoffice-bin hsqldb</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>200771</bug>
<bug>201799</bug>
<access>remote</access>
@@ -58,30 +57,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.3.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.3.1"</code>
<p>
All HSQLDB users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/hsqldb-1.8.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/hsqldb-1.8.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575">CVE-2007-4575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575">CVE-2007-4575</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:31:31 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:31:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Dec 2007 23:31:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-08T23:31:39Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Dec 2007 00:15:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-09T00:15:00Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-01.xml b/glsa-200801-01.xml
index 5823d0ea..a152e89f 100644
--- a/glsa-200801-01.xml
+++ b/glsa-200801-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-01">
<title>unp: Arbitrary command execution</title>
<synopsis>
unp allows execution of arbitrary code via malicious file names.
</synopsis>
<product type="ebuild">remote</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>203106</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unp-1.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unp-1.0.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6610">CVE-2007-6610</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6610">CVE-2007-6610</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Dec 2007 00:23:45 +0000">
+ <metadata tag="requester" timestamp="2007-12-28T00:23:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Dec 2007 11:27:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-28T11:27:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 22:57:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T22:57:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-02.xml b/glsa-200801-02.xml
index a3004f0b..ffbe0c70 100644
--- a/glsa-200801-02.xml
+++ b/glsa-200801-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-02">
<title>R: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">R</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 02</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 02</revised>
<bug>198976</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/R-2.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/R-2.2.1-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Nov 2007 22:35:44 +0000">
+ <metadata tag="requester" timestamp="2007-11-20T22:35:44Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Nov 2007 00:08:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-21T00:08:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Jan 2008 22:08:35 +0000">
+ <metadata tag="submitter" timestamp="2008-01-03T22:08:35Z">
py2
</metadata>
</glsa>
diff --git a/glsa-200801-03.xml b/glsa-200801-03.xml
index 591c70a4..e3ccde8c 100644
--- a/glsa-200801-03.xml
+++ b/glsa-200801-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-03">
<title>Claws Mail: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attack.
</synopsis>
<product type="ebuild">claws-mail</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>201244</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/claws-mail-3.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/claws-mail-3.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6208">CVE-2007-6208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6208">CVE-2007-6208</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2008 23:01:06 +0000">
+ <metadata tag="requester" timestamp="2008-01-06T23:01:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 23:07:07 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T23:07:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jan 2008 23:07:18 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-08T23:07:18Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-04.xml b/glsa-200801-04.xml
index e92999a7..057c050f 100644
--- a/glsa-200801-04.xml
+++ b/glsa-200801-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-04">
<title>OpenAFS: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in OpenAFS.
</synopsis>
<product type="ebuild">openafs</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>203573</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599">CVE-2007-6599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599">CVE-2007-6599</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jan 2008 00:13:45 +0000">
+ <metadata tag="requester" timestamp="2008-01-05T00:13:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 21:35:12 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T21:35:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jan 2008 21:35:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-08T21:35:21Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-05.xml b/glsa-200801-05.xml
index 57cb2074..e770143b 100644
--- a/glsa-200801-05.xml
+++ b/glsa-200801-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-05">
<title>Squid: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in Squid.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>201209</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jan 2008 21:43:38 +0000">
+ <metadata tag="requester" timestamp="2008-01-05T21:43:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Jan 2008 21:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-05T21:44:28Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jan 2008 21:35:14 +0000">
+ <metadata tag="submitter" timestamp="2008-01-07T21:35:14Z">
py2
</metadata>
</glsa>
diff --git a/glsa-200801-06.xml b/glsa-200801-06.xml
index 140156b2..ffa97092 100644
--- a/glsa-200801-06.xml
+++ b/glsa-200801-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-06">
<title>Xfce: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">xfce4-panel libxfcegui4</product>
- <announced>January 09, 2008</announced>
- <revised>January 10, 2008: 03</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-10: 03</revised>
<bug>201292</bug>
<bug>201293</bug>
<access>remote</access>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=xfce-base/xfce4-panel-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=xfce-base/xfce4-panel-4.4.2"</code>
<p>
All libxfcegui4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=xfce-base/libxfcegui4-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=xfce-base/libxfcegui4-4.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531">CVE-2007-6531</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532">CVE-2007-6532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531">CVE-2007-6531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532">CVE-2007-6532</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:45:36 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:45:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Dec 2007 13:22:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-22T13:22:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Dec 2007 16:37:18 +0000">
+ <metadata tag="submitter" timestamp="2007-12-22T16:37:18Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200801-07.xml b/glsa-200801-07.xml
index fdf22396..c3512754 100644
--- a/glsa-200801-07.xml
+++ b/glsa-200801-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-07">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 20, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-01-20</announced>
+ <revised>2009-05-28: 03</revised>
<bug>193519</bug>
<access>remote</access>
<affected>
@@ -70,7 +69,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.115.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.115.0"</code>
<p>
Please be advised that unaffected packages of the Adobe Flash Player
have known problems when used from within the Konqueror and Opera
@@ -78,23 +77,23 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324">CVE-2007-4324</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242">CVE-2007-6242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244">CVE-2007-6244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245">CVE-2007-6245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246">CVE-2007-6246</uri>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324">CVE-2007-4324</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242">CVE-2007-6242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244">CVE-2007-6244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245">CVE-2007-6245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246">CVE-2007-6246</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2008 22:05:12 +0000">
+ <metadata tag="requester" timestamp="2008-01-01T22:05:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jan 2008 17:34:55 +0000">
+ <metadata tag="submitter" timestamp="2008-01-15T17:34:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jan 2008 17:41:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-15T17:41:04Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200801-08.xml b/glsa-200801-08.xml
index d495abe5..fc8650c0 100644
--- a/glsa-200801-08.xml
+++ b/glsa-200801-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-08">
<title>libcdio: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in libcdio.
</synopsis>
<product type="ebuild">libcdio</product>
- <announced>January 20, 2008</announced>
- <revised>January 20, 2008: 01</revised>
+ <announced>2008-01-20</announced>
+ <revised>2008-01-20: 01</revised>
<bug>203777</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libcdio-0.78.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libcdio-0.78.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613">CVE-2007-6613</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613">CVE-2007-6613</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2008 22:05:45 +0000">
+ <metadata tag="requester" timestamp="2008-01-01T22:05:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 21:42:57 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T21:42:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jan 2008 17:44:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-15T17:44:04Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200801-09.xml b/glsa-200801-09.xml
index 607731b3..a0a2e795 100644
--- a/glsa-200801-09.xml
+++ b/glsa-200801-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-09">
<title>X.Org X server and Xfont library: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">xorg-server libXfont</product>
- <announced>January 20, 2008</announced>
- <revised>March 05, 2008: 03</revised>
+ <announced>2008-01-20</announced>
+ <revised>2008-03-05: 03</revised>
<bug>204362</bug>
<bug>208343</bug>
<access>remote, local</access>
@@ -78,27 +77,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r5"</code>
<p>
All X.Org Xfont library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.3.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.3.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2007-5760</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2007-5958</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2007-6427</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2007-6428</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</uri>
- <uri link="http://lists.freedesktop.org/archives/xorg/2008-January/031918.html">X.Org security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2007-5760</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2007-5958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2007-6427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2007-6428</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</uri>
+ <uri link="https://lists.freedesktop.org/archives/xorg/2008-January/031918.html">X.Org security advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 05 Jan 2008 02:03:56 +0000">
+ <metadata tag="submitter" timestamp="2008-01-05T02:03:56Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Jan 2008 15:57:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-17T15:57:38Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-10.xml b/glsa-200801-10.xml
index 36dfca6a..7357795d 100644
--- a/glsa-200801-10.xml
+++ b/glsa-200801-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-10">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
having unknown impact.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 23, 2008</announced>
- <revised>January 23, 2008: 01</revised>
+ <announced>2008-01-23</announced>
+ <revised>2008-01-23: 01</revised>
<bug>203265</bug>
<access>remote</access>
<affected>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6526">CVE-2007-6526</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6528">CVE-2007-6528</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6529">CVE-2007-6529</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6526">CVE-2007-6526</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6528">CVE-2007-6528</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6529">CVE-2007-6529</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Jan 2008 18:58:53 +0000">
+ <metadata tag="requester" timestamp="2008-01-20T18:58:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 21:50:20 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T21:50:20Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 22:40:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T22:40:20Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200801-11.xml b/glsa-200801-11.xml
index bafa715a..a8384662 100644
--- a/glsa-200801-11.xml
+++ b/glsa-200801-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-11">
<title>CherryPy: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to read and write arbitrary files.
</synopsis>
<product type="ebuild">cherrypy</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>204829</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-2.2.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-2.2.1-r2"</code>
<p>
All CherryPy 3.0 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-3.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-3.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252">CVE-2008-0252</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252">CVE-2008-0252</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jan 2008 20:11:50 +0000">
+ <metadata tag="requester" timestamp="2008-01-10T20:11:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 02:16:18 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T02:16:18Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Jan 2008 19:16:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-26T19:16:48Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-12.xml b/glsa-200801-12.xml
index 2dc78766..534acea7 100644
--- a/glsa-200801-12.xml
+++ b/glsa-200801-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-12">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
processing RTSP streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>205197</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.9.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225">CVE-2008-0225</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238">CVE-2008-0238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225">CVE-2008-0225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238">CVE-2008-0238</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Jan 2008 19:08:20 +0000">
+ <metadata tag="requester" timestamp="2008-01-16T19:08:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 01:56:19 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T01:56:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Jan 2008 21:39:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-26T21:39:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-13.xml b/glsa-200801-13.xml
index 31a95b20..d5c71410 100644
--- a/glsa-200801-13.xml
+++ b/glsa-200801-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-13">
<title>ngIRCd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">ngircd</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 02</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 02</revised>
<bug>204834</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ngircd-0.10.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ngircd-0.10.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0285">CVE-2008-0285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0285">CVE-2008-0285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2008 20:42:37 +0000">
+ <metadata tag="requester" timestamp="2008-01-15T20:42:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 01:06:19 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T01:06:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 01:44:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T01:44:35Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200801-14.xml b/glsa-200801-14.xml
index 4a12d03e..43fd9a3f 100644
--- a/glsa-200801-14.xml
+++ b/glsa-200801-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-14">
<title>Blam: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
local attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">blam</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>199841</bug>
<access>local</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-news/blam-1.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-news/blam-1.8.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 00:54:46 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T00:54:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:55:57 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:55:57Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200801-15.xml b/glsa-200801-15.xml
index bc2c31ab..d19d0549 100644
--- a/glsa-200801-15.xml
+++ b/glsa-200801-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-15">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation or a Denial of Service.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>204760</bug>
<access>remote</access>
<affected>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3278">CVE-2007-3278</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3278">CVE-2007-3278</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Jan 2008 00:00:08 +0000">
+ <metadata tag="requester" timestamp="2008-01-20T00:00:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:56:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 22:38:13 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T22:38:13Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200801-16.xml b/glsa-200801-16.xml
index 75f2cd23..64ff82cb 100644
--- a/glsa-200801-16.xml
+++ b/glsa-200801-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-16">
<title>MaraDNS: CNAME Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
resolution.
</synopsis>
<product type="ebuild">maradns</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>204351</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/maradns-1.2.12.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/maradns-1.2.12.09"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0061">CVE-2008-0061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0061">CVE-2008-0061</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Jan 2008 19:19:02 +0000">
+ <metadata tag="requester" timestamp="2008-01-27T19:19:02Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 17:41:20 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T17:41:20Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:03:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:03:45Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200801-17.xml b/glsa-200801-17.xml
index b32c4a3d..817f8635 100644
--- a/glsa-200801-17.xml
+++ b/glsa-200801-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-17">
<title>Netkit FTP Server: Denial of Service</title>
<synopsis>
Netkit FTP Server contains a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">netkit-ftpd</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>199206</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6263">CVE-2007-6263</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6263">CVE-2007-6263</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Jan 2008 19:17:40 +0000">
+ <metadata tag="requester" timestamp="2008-01-27T19:17:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 18:03:07 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T18:03:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:03:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:03:42Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200801-18.xml b/glsa-200801-18.xml
index cb08d8d0..e15eca31 100644
--- a/glsa-200801-18.xml
+++ b/glsa-200801-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-18">
<title>Kazehakase: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">kazehakase</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>198983</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/kazehakase-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/kazehakase-0.5.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2008 23:02:26 +0000">
+ <metadata tag="requester" timestamp="2008-01-06T23:02:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:33:56 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:33:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 19:34:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T19:34:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-19.xml b/glsa-200801-19.xml
index 077ea6d4..e60d50c0 100644
--- a/glsa-200801-19.xml
+++ b/glsa-200801-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-19">
<title>GOffice: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">goffice</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>198385</bug>
<access>remote</access>
<affected>
@@ -49,24 +48,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/goffice-0.4.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/goffice-0.4.3"</code>
<p>
All GOffice 0.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/goffice-0.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/goffice-0.6.1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jan 2008 19:49:11 +0000">
+ <metadata tag="requester" timestamp="2008-01-10T19:49:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:42:53 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:42:53Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 19:43:29 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T19:43:29Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-20.xml b/glsa-200801-20.xml
index 2c8fd240..c70a2ab0 100644
--- a/glsa-200801-20.xml
+++ b/glsa-200801-20.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-20">
<title>libxml2: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in libxml2.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>202628</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.6.30-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.6.30-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284">CVE-2007-6284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284">CVE-2007-6284</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Jan 2008 01:14:43 +0000">
+ <metadata tag="requester" timestamp="2008-01-12T01:14:43Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 19:48:32 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T19:48:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 19:48:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T19:48:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-21.xml b/glsa-200801-21.xml
index 1325319f..8642730a 100644
--- a/glsa-200801-21.xml
+++ b/glsa-200801-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-21">
<title>Xdg-Utils: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary commands.
</synopsis>
<product type="ebuild">xdg-utils</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>207331</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xdg-utils-1.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xdg-utils-1.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386">CVE-2008-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386">CVE-2008-0386</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Jan 2008 12:15:55 +0000">
+ <metadata tag="requester" timestamp="2008-01-26T12:15:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 20:04:22 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T20:04:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 20:04:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T20:04:30Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200801-22.xml b/glsa-200801-22.xml
index 948fb6b1..ec8b595d 100644
--- a/glsa-200801-22.xml
+++ b/glsa-200801-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-22">
<title>PeerCast: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in PeerCast.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 02</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 02</revised>
<bug>202747</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1218&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1218"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6454">CVE-2007-6454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6454">CVE-2007-6454</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Jan 2008 08:22:19 +0000">
+ <metadata tag="requester" timestamp="2008-01-11T08:22:19Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:51:49 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:51:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 23:04:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T23:04:06Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200802-01.xml b/glsa-200802-01.xml
index c66baec2..8d23519f 100644
--- a/glsa-200802-01.xml
+++ b/glsa-200802-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-01">
<title>SDL_image: Two buffer overflow vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
the library.
</synopsis>
<product type="ebuild">sdl-image</product>
- <announced>February 06, 2008</announced>
- <revised>February 06, 2008: 01</revised>
+ <announced>2008-02-06</announced>
+ <revised>2008-02-06: 01</revised>
<bug>207933</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/sdl-image-1.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/sdl-image-1.2.6-r1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/28640/">SA28640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6697">CVE-2007-6697</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0544">CVE-2008-0544</uri>
+ <uri link="https://secunia.com/advisories/28640/">SA28640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6697">CVE-2007-6697</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0544">CVE-2008-0544</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 09:35:04 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T09:35:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 09:36:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T09:36:22Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200802-02.xml b/glsa-200802-02.xml
index c309b3c6..936a472d 100644
--- a/glsa-200802-02.xml
+++ b/glsa-200802-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-02">
<title>Doomsday: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">doomsday</product>
- <announced>February 06, 2008</announced>
- <revised>February 10, 2008: 02</revised>
+ <announced>2008-02-06</announced>
+ <revised>2008-02-10: 02</revised>
<bug>190835</bug>
<access>remote</access>
<affected>
@@ -59,17 +58,17 @@
# emerge --unmerge games-fps/doomsday</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4642">CVE-2007-4642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4643">CVE-2007-4643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4644">CVE-2007-4644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4642">CVE-2007-4642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4643">CVE-2007-4643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4644">CVE-2007-4644</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Dec 2007 00:50:29 +0000">
+ <metadata tag="requester" timestamp="2007-12-06T00:50:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Dec 2007 01:08:23 +0000">
+ <metadata tag="submitter" timestamp="2007-12-12T01:08:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:41:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:41:43Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200802-03.xml b/glsa-200802-03.xml
index da27243e..ed501e5b 100644
--- a/glsa-200802-03.xml
+++ b/glsa-200802-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-03">
<title>Horde IMP: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
restrictions.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>February 11, 2008</announced>
- <revised>February 11, 2008: 01</revised>
+ <announced>2008-02-11</announced>
+ <revised>2008-02-11: 01</revised>
<bug>205377</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-4.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-4.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6018">CVE-2007-6018</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6018">CVE-2007-6018</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Feb 2008 12:56:07 +0000">
+ <metadata tag="submitter" timestamp="2008-02-05T12:56:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Feb 2008 12:56:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-05T12:56:20Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-04.xml b/glsa-200802-04.xml
index ce679800..2ca72299 100644
--- a/glsa-200802-04.xml
+++ b/glsa-200802-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-04">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were discovered in Gallery.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>February 11, 2008</announced>
- <revised>February 11, 2008: 01</revised>
+ <announced>2008-02-11</announced>
+ <revised>2008-02-11: 01</revised>
<bug>203217</bug>
<access>remote</access>
<affected>
@@ -50,26 +49,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6685">CVE-2007-6685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6686">CVE-2007-6686</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6687">CVE-2007-6687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6688">CVE-2007-6688</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6689">CVE-2007-6689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6690">CVE-2007-6690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6691">CVE-2007-6691</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6692">CVE-2007-6692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6693">CVE-2007-6693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6685">CVE-2007-6685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6686">CVE-2007-6686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6687">CVE-2007-6687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6688">CVE-2007-6688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6689">CVE-2007-6689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6690">CVE-2007-6690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6691">CVE-2007-6691</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6692">CVE-2007-6692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6693">CVE-2007-6693</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Jan 2008 19:59:20 +0000">
+ <metadata tag="requester" timestamp="2008-01-23T19:59:20Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Jan 2008 19:59:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-23T19:59:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Feb 2008 11:03:19 +0000">
+ <metadata tag="submitter" timestamp="2008-02-06T11:03:19Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-05.xml b/glsa-200802-05.xml
index fb22a1dc..064dfc64 100644
--- a/glsa-200802-05.xml
+++ b/glsa-200802-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-05">
<title>Gnumeric: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly resulting in user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">gnumeric</product>
- <announced>February 12, 2008</announced>
- <revised>February 12, 2008: 01</revised>
+ <announced>2008-02-12</announced>
+ <revised>2008-02-12: 01</revised>
<bug>208356</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668">CVE-2008-0668</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668">CVE-2008-0668</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 23:12:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T23:12:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 23:12:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T23:12:22Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Feb 2008 08:14:23 +0000">
+ <metadata tag="submitter" timestamp="2008-02-12T08:14:23Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-06.xml b/glsa-200802-06.xml
index e6001dbc..39e78bf1 100644
--- a/glsa-200802-06.xml
+++ b/glsa-200802-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-06">
<title>scponly: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
security restrictions.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>February 12, 2008</announced>
- <revised>February 13, 2008: 02</revised>
+ <announced>2008-02-12</announced>
+ <revised>2008-02-13: 02</revised>
<bug>201726</bug>
<bug>203099</bug>
<access>local</access>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.8"</code>
<p>
Due to the design of scponly's Subversion support, security
restrictions can still be circumvented. Please read carefully the
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350">CVE-2007-6350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6415">CVE-2007-6415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350">CVE-2007-6350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6415">CVE-2007-6415</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Jan 2008 02:02:07 +0000">
+ <metadata tag="requester" timestamp="2008-01-23T02:02:07Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Feb 2008 10:51:42 +0000">
+ <metadata tag="submitter" timestamp="2008-02-06T10:51:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Feb 2008 10:51:57 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-06T10:51:57Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-07.xml b/glsa-200802-07.xml
index a26a244b..b9739c9f 100644
--- a/glsa-200802-07.xml
+++ b/glsa-200802-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-07">
<title>Pulseaudio: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with escalated privileges.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>February 13, 2008</announced>
- <revised>February 13, 2008: 01</revised>
+ <announced>2008-02-13</announced>
+ <revised>2008-02-13: 01</revised>
<bug>207214</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/pulseaudio-0.9.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/pulseaudio-0.9.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0008">CVE-2008-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0008">CVE-2008-0008</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Feb 2008 18:33:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-11T18:33:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Feb 2008 18:33:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-11T18:33:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Feb 2008 20:35:58 +0000">
+ <metadata tag="submitter" timestamp="2008-02-13T20:35:58Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-08.xml b/glsa-200802-08.xml
index fa0766cb..90b70c4c 100644
--- a/glsa-200802-08.xml
+++ b/glsa-200802-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-08">
<title>Boost: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in a Denial of Service.
</synopsis>
<product type="ebuild">boost</product>
- <announced>February 14, 2008</announced>
- <revised>February 14, 2008: 01</revised>
+ <announced>2008-02-14</announced>
+ <revised>2008-02-14: 01</revised>
<bug>205955</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/boost-1.34.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/boost-1.34.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171">CVE-2008-0171</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172">CVE-2008-0172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171">CVE-2008-0171</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172">CVE-2008-0172</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 14:26:57 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T14:26:57Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 14:27:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T14:27:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Feb 2008 20:51:31 +0000">
+ <metadata tag="submitter" timestamp="2008-02-13T20:51:31Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-09.xml b/glsa-200802-09.xml
index 51ea7f65..363ea4c7 100644
--- a/glsa-200802-09.xml
+++ b/glsa-200802-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-09">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>February 21, 2008</announced>
- <revised>February 21, 2008: 01</revised>
+ <announced>2008-02-21</announced>
+ <revised>2008-02-21: 01</revised>
<bug>209915</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.92.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.92.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318">CVE-2008-0318</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728">CVE-2008-0728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318">CVE-2008-0318</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728">CVE-2008-0728</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Feb 2008 20:13:32 +0000">
+ <metadata tag="requester" timestamp="2008-02-19T20:13:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Feb 2008 20:14:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-19T20:14:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Feb 2008 21:50:12 +0000">
+ <metadata tag="submitter" timestamp="2008-02-19T21:50:12Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200802-10.xml b/glsa-200802-10.xml
index c1739da2..8a45fb51 100644
--- a/glsa-200802-10.xml
+++ b/glsa-200802-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-10">
<title>Python: PCRE Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">python</product>
- <announced>February 23, 2008</announced>
- <revised>February 23, 2008: 01</revised>
+ <announced>2008-02-23</announced>
+ <revised>2008-02-23: 01</revised>
<bug>198373</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jan 2008 19:00:53 +0000">
+ <metadata tag="requester" timestamp="2008-01-07T19:00:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:01:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Feb 2008 22:37:11 +0000">
+ <metadata tag="submitter" timestamp="2008-02-18T22:37:11Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200802-11.xml b/glsa-200802-11.xml
index 905d66fd..fe793017 100644
--- a/glsa-200802-11.xml
+++ b/glsa-200802-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-11">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been found in Asterisk.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>February 26, 2008</announced>
- <revised>February 26, 2008: 01</revised>
+ <announced>2008-02-26</announced>
+ <revised>2008-02-26: 01</revised>
<bug>185713</bug>
<access>remote</access>
<affected>
@@ -65,21 +64,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762">CVE-2007-3762</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763">CVE-2007-3763</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764">CVE-2007-3764</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4103">CVE-2007-4103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762">CVE-2007-3762</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763">CVE-2007-3763</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764">CVE-2007-3764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4103">CVE-2007-4103</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:55:16 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T19:55:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Nov 2007 23:26:53 +0000">
+ <metadata tag="submitter" timestamp="2007-11-22T23:26:53Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 19:44:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T19:44:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200802-12.xml b/glsa-200802-12.xml
index 38273370..640f80a9 100644
--- a/glsa-200802-12.xml
+++ b/glsa-200802-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-12">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
and ASF streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>February 26, 2008</announced>
- <revised>March 03, 2008: 02</revised>
+ <announced>2008-02-26</announced>
+ <revised>2008-03-03: 02</revised>
<bug>209106</bug>
<bug>208100</bug>
<access>remote</access>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110">CVE-2008-1110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110">CVE-2008-1110</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 08:36:00 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T08:36:00Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Feb 2008 08:36:16 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-20T08:36:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Feb 2008 19:46:42 +0000">
+ <metadata tag="submitter" timestamp="2008-02-23T19:46:42Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-01.xml b/glsa-200803-01.xml
index c5e2ffa6..2d2bae4c 100644
--- a/glsa-200803-01.xml
+++ b/glsa-200803-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-01">
<title>Adobe Acrobat Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, and cross-site request forgery attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>March 02, 2008</announced>
- <revised>March 05, 2008: 05</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-05: 05</revised>
<bug>170177</bug>
<access>remote</access>
<affected>
@@ -64,24 +63,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1199">CVE-2007-1199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659">CVE-2007-5659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5663">CVE-2007-5663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5666">CVE-2007-5666</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655">CVE-2008-0655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667">CVE-2008-0667</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726">CVE-2008-0726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1199">CVE-2007-1199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659">CVE-2007-5659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5663">CVE-2007-5663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5666">CVE-2007-5666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655">CVE-2008-0655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667">CVE-2008-0667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726">CVE-2008-0726</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Feb 2008 00:03:23 +0000">
+ <metadata tag="requester" timestamp="2008-02-12T00:03:23Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Feb 2008 22:32:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-27T22:32:54Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Feb 2008 22:33:01 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-27T22:33:01Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-02.xml b/glsa-200803-02.xml
index c40bee1b..42429c04 100644
--- a/glsa-200803-02.xml
+++ b/glsa-200803-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-02">
<title>Firebird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>March 02, 2008</announced>
- <revised>March 02, 2008: 01</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-02: 01</revised>
<bug>208034</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0387">CVE-2008-0387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467">CVE-2008-0467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0387">CVE-2008-0387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467">CVE-2008-0467</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Feb 2008 20:05:19 +0000">
+ <metadata tag="requester" timestamp="2008-02-25T20:05:19Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Feb 2008 20:05:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-25T20:05:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:57:14 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:57:14Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-03.xml b/glsa-200803-03.xml
index 0887865d..370cc92e 100644
--- a/glsa-200803-03.xml
+++ b/glsa-200803-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-03">
<title>Audacity: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">audacity</product>
- <announced>March 02, 2008</announced>
- <revised>March 02, 2008: 01</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-02: 01</revised>
<bug>199751</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacity-1.3.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacity-1.3.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6061">CVE-2007-6061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6061">CVE-2007-6061</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 00:55:24 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T00:55:24Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Feb 2008 22:46:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-26T22:46:54Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 22:47:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T22:47:07Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-04.xml b/glsa-200803-04.xml
index 54af5d2c..78c85e14 100644
--- a/glsa-200803-04.xml
+++ b/glsa-200803-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-04">
<title>Mantis: Cross-Site Scripting</title>
<synopsis>
@@ -8,8 +7,8 @@
Mantis.
</synopsis>
<product type="ebuild">mantis</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>203791</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611">CVE-2007-6611</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611">CVE-2007-6611</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 18:16:34 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T18:16:34Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 18:16:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T18:16:43Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:32:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:32:54Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-05.xml b/glsa-200803-05.xml
index e43f1260..0797e68e 100644
--- a/glsa-200803-05.xml
+++ b/glsa-200803-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-05">
<title>SplitVT: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">splitvt</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>211240</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/splitvt-1.6.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/splitvt-1.6.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0162">CVE-2008-0162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0162">CVE-2008-0162</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 20:35:01 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T20:35:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 20:35:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T20:35:10Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 11:02:58 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T11:02:58Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-06.xml b/glsa-200803-06.xml
index 35c4c730..1882e8e0 100644
--- a/glsa-200803-06.xml
+++ b/glsa-200803-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-06">
<title>SWORD: Shell command injection</title>
<synopsis>
Insufficient input checking in SWORD may allow shell command injection.
</synopsis>
<product type="ebuild">sword</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>210754</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/sword-1.5.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/sword-1.5.8-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0932">CVE-2008-0932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0932">CVE-2008-0932</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Feb 2008 19:11:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-23T19:11:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 12:41:01 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T12:41:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Feb 2008 12:41:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-29T12:41:15Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-07.xml b/glsa-200803-07.xml
index bcb1ffd9..a223e721 100644
--- a/glsa-200803-07.xml
+++ b/glsa-200803-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-07">
<title>Paramiko: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">paramiko</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>205777</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/paramiko-1.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/paramiko-1.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0299">CVE-2008-0299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0299">CVE-2008-0299</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Feb 2008 18:32:09 +0000">
+ <metadata tag="requester" timestamp="2008-02-11T18:32:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Feb 2008 18:33:24 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-11T18:33:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:43:49 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:43:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-08.xml b/glsa-200803-08.xml
index cc8a870c..3ff75391 100644
--- a/glsa-200803-08.xml
+++ b/glsa-200803-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-08">
<title>Win32 binary codecs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">win32codecs</product>
- <announced>March 04, 2008</announced>
- <revised>March 04, 2008: 01</revised>
+ <announced>2008-03-04</announced>
+ <revised>2008-03-04: 01</revised>
<bug>150288</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/win32codecs-20071007-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/win32codecs-20071007-r2"</code>
<p>
Note: Since no updated binary versions have been released, the
Quicktime libraries have been removed from the package. Please use the
@@ -57,22 +56,22 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4382">CVE-2006-4382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384">CVE-2006-4384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4385">CVE-2006-4385</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4386">CVE-2006-4386</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4388">CVE-2006-4388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4389">CVE-2006-4389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674">CVE-2007-4674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166">CVE-2007-6166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4382">CVE-2006-4382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384">CVE-2006-4384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4385">CVE-2006-4385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4386">CVE-2006-4386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4388">CVE-2006-4388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4389">CVE-2006-4389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674">CVE-2007-4674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166">CVE-2007-6166</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Nov 2007 22:48:06 +0000">
+ <metadata tag="requester" timestamp="2007-11-13T22:48:06Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Nov 2007 22:48:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-13T22:48:15Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 10:44:06 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T10:44:06Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-09.xml b/glsa-200803-09.xml
index d599f314..624d95bb 100644
--- a/glsa-200803-09.xml
+++ b/glsa-200803-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-09">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure, privilege escalation and Cross-Site scripting.
</synopsis>
<product type="ebuild">opera</product>
- <announced>March 04, 2008</announced>
- <revised>March 04, 2008: 01</revised>
+ <announced>2008-03-04</announced>
+ <revised>2008-03-04: 01</revised>
<bug>210260</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080">CVE-2008-1080</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081">CVE-2008-1081</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082">CVE-2008-1082</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080">CVE-2008-1080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081">CVE-2008-1081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082">CVE-2008-1082</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 10:02:38 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T10:02:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 10:02:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T10:02:54Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Mar 2008 22:56:26 +0000">
+ <metadata tag="submitter" timestamp="2008-03-02T22:56:26Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200803-10.xml b/glsa-200803-10.xml
index 53d05088..4052ba40 100644
--- a/glsa-200803-10.xml
+++ b/glsa-200803-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-10">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been discovered in lighttpd.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>211230</bug>
<bug>211956</bug>
<access>remote</access>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.18-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983">CVE-2008-0983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111">CVE-2008-1111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983">CVE-2008-0983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111">CVE-2008-1111</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Mar 2008 13:11:03 +0000">
+ <metadata tag="requester" timestamp="2008-03-02T13:11:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Mar 2008 22:33:25 +0000">
+ <metadata tag="submitter" timestamp="2008-03-02T22:33:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Mar 2008 21:56:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-04T21:56:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-11.xml b/glsa-200803-11.xml
index 604e619a..efcd9210 100644
--- a/glsa-200803-11.xml
+++ b/glsa-200803-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-11">
<title>Vobcopy: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">vobcopy</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>197578</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vobcopy-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vobcopy-1.1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5718">CVE-2007-5718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5718">CVE-2007-5718</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Mar 2008 14:25:49 +0000">
+ <metadata tag="requester" timestamp="2008-03-04T14:25:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Mar 2008 22:37:51 +0000">
+ <metadata tag="submitter" timestamp="2008-03-04T22:37:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Mar 2008 22:38:00 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-04T22:38:00Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-12.xml b/glsa-200803-12.xml
index b69d9090..247efb86 100644
--- a/glsa-200803-12.xml
+++ b/glsa-200803-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-12">
<title>Evolution: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>212272</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.12.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.12.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072">CVE-2008-0072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072">CVE-2008-0072</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Mar 2008 20:09:16 +0000">
+ <metadata tag="requester" timestamp="2008-03-05T20:09:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 21:00:40 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T21:00:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Mar 2008 21:00:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-05T21:00:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-13.xml b/glsa-200803-13.xml
index b56be226..747ef86a 100644
--- a/glsa-200803-13.xml
+++ b/glsa-200803-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-13">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>March 07, 2008</announced>
- <revised>March 07, 2008: 01</revised>
+ <announced>2008-03-07</announced>
+ <revised>2008-03-07: 01</revised>
<bug>203345</bug>
<bug>211575</bug>
<bug>205299</bug>
@@ -78,21 +77,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6e"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682">CVE-2007-6682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683">CVE-2007-6683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684">CVE-2007-6684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295">CVE-2008-0295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296">CVE-2008-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984">CVE-2008-0984</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682">CVE-2007-6682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683">CVE-2007-6683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684">CVE-2007-6684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295">CVE-2008-0295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296">CVE-2008-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984">CVE-2008-0984</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 21:55:08 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T21:55:08Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 18:42:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T18:42:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-14.xml b/glsa-200803-14.xml
index d4d29807..c8da6d5c 100644
--- a/glsa-200803-14.xml
+++ b/glsa-200803-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-14">
<title>Ghostscript: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">ghostscript</product>
- <announced>March 08, 2008</announced>
- <revised>March 08, 2008: 01</revised>
+ <announced>2008-03-08</announced>
+ <revised>2008-03-08: 01</revised>
<bug>208999</bug>
<access>remote</access>
<affected>
@@ -58,30 +57,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-esp-8.15.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-esp-8.15.4-r1"</code>
<p>
All Ghostscript GPL users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gpl-8.61-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gpl-8.61-r3"</code>
<p>
All Ghostscript GNU users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gnu-8.60.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gnu-8.60.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411">CVE-2008-0411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411">CVE-2008-0411</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Mar 2008 15:25:45 +0000">
+ <metadata tag="requester" timestamp="2008-03-02T15:25:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Mar 2008 15:25:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-02T15:25:54Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 20:06:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T20:06:31Z">
psychoschlumpf
</metadata>
</glsa>
diff --git a/glsa-200803-15.xml b/glsa-200803-15.xml
index 03da9bc5..221c815a 100644
--- a/glsa-200803-15.xml
+++ b/glsa-200803-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-15">
<title>phpMyAdmin: SQL injection vulnerability</title>
<synopsis>
A SQL injection vulnerability has been discovered in phpMyAdmin.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>March 09, 2008</announced>
- <revised>March 09, 2008: 01</revised>
+ <announced>2008-03-09</announced>
+ <revised>2008-03-09: 01</revised>
<bug>212000</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149">CVE-2008-1149</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149">CVE-2008-1149</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Mar 2008 09:53:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-05T09:53:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 08:44:33 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T08:44:33Z">
psychoschlumpf
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 10:05:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T10:05:31Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-16.xml b/glsa-200803-16.xml
index c047d780..e10529b9 100644
--- a/glsa-200803-16.xml
+++ b/glsa-200803-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-16">
<title>MPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>March 10, 2008</announced>
- <revised>March 10, 2008: 01</revised>
+ <announced>2008-03-10</announced>
+ <revised>2008-03-10: 01</revised>
<bug>208566</bug>
<access>remote</access>
<affected>
@@ -61,21 +60,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p25993&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p25993"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485">CVE-2008-0485</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629">CVE-2008-0629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630">CVE-2008-0630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485">CVE-2008-0485</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629">CVE-2008-0629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630">CVE-2008-0630</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Feb 2008 20:10:11 +0000">
+ <metadata tag="requester" timestamp="2008-02-19T20:10:11Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Feb 2008 20:13:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-19T20:13:04Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 23:38:09 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T23:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-17.xml b/glsa-200803-17.xml
index f4a421d7..aefdbe78 100644
--- a/glsa-200803-17.xml
+++ b/glsa-200803-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-17">
<title>PDFlib: Multiple buffer overflows</title>
<synopsis>
Multiple stack-based buffer overflows have been reported in PDFlib.
</synopsis>
<product type="ebuild">pdflib</product>
- <announced>March 10, 2008</announced>
- <revised>March 10, 2008: 01</revised>
+ <announced>2008-03-10</announced>
+ <revised>2008-03-10: 01</revised>
<bug>203287</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/pdflib-7.0.2_p8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/pdflib-7.0.2_p8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6561">CVE-2007-6561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6561">CVE-2007-6561</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:26:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:26:44Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Mar 2008 12:46:32 +0000">
+ <metadata tag="submitter" timestamp="2008-03-10T12:46:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Mar 2008 12:46:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-10T12:46:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-18.xml b/glsa-200803-18.xml
index e9a08c9b..4bbd0163 100644
--- a/glsa-200803-18.xml
+++ b/glsa-200803-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-18">
<title>Cacti: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were discovered in Cacti.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>March 10, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-03-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>209918</bug>
<access>remote</access>
<affected>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.7b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.7b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783">CVE-2008-0783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784">CVE-2008-0784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785">CVE-2008-0785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786">CVE-2008-0786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783">CVE-2008-0783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784">CVE-2008-0784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785">CVE-2008-0785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786">CVE-2008-0786</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Feb 2008 22:16:20 +0000">
+ <metadata tag="requester" timestamp="2008-02-25T22:16:20Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 23:16:40 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T23:16:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 23:16:51 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T23:16:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-19.xml b/glsa-200803-19.xml
index 5abd6290..e046c309 100644
--- a/glsa-200803-19.xml
+++ b/glsa-200803-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-19">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been discovered in Apache.
</synopsis>
<product type="ebuild">apache</product>
- <announced>March 11, 2008</announced>
- <revised>March 12, 2008: 02</revised>
+ <announced>2008-03-11</announced>
+ <revised>2008-03-12: 02</revised>
<bug>201163</bug>
<bug>204410</bug>
<bug>205195</bug>
@@ -57,22 +56,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203">CVE-2007-6203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422">CVE-2007-6422</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005">CVE-2008-0005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455">CVE-2008-0455</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0456">CVE-2008-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203">CVE-2007-6203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422">CVE-2007-6422</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005">CVE-2008-0005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455">CVE-2008-0455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0456">CVE-2008-0456</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jan 2008 14:04:58 +0000">
+ <metadata tag="requester" timestamp="2008-01-13T14:04:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Mar 2008 12:30:36 +0000">
+ <metadata tag="submitter" timestamp="2008-03-10T12:30:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Mar 2008 12:31:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-10T12:31:50Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-20.xml b/glsa-200803-20.xml
index fa47995e..0e561379 100644
--- a/glsa-200803-20.xml
+++ b/glsa-200803-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-20">
<title>International Components for Unicode: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>March 11, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-03-11</announced>
+ <revised>2009-05-28: 03</revised>
<bug>208001</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/icu-3.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/icu-3.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 08:30:44 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T08:30:44Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Feb 2008 08:30:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-20T08:30:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Mar 2008 12:40:50 +0000">
+ <metadata tag="submitter" timestamp="2008-03-11T12:40:50Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-21.xml b/glsa-200803-21.xml
index 22f48c76..b1c18b59 100644
--- a/glsa-200803-21.xml
+++ b/glsa-200803-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-21">
<title>Sarg: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
untrusted input files.
</synopsis>
<product type="ebuild">sarg</product>
- <announced>March 12, 2008</announced>
- <revised>March 12, 2008: 01</revised>
+ <announced>2008-03-12</announced>
+ <revised>2008-03-12: 01</revised>
<bug>212208</bug>
<bug>212731</bug>
<access>remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/sarg-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/sarg-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167">CVE-2008-1167</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168">CVE-2008-1168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167">CVE-2008-1167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168">CVE-2008-1168</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:52:09 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:52:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Mar 2008 18:03:52 +0000">
+ <metadata tag="submitter" timestamp="2008-03-09T18:03:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Mar 2008 21:03:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-09T21:03:08Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-22.xml b/glsa-200803-22.xml
index 39fc2a76..00cdd46c 100644
--- a/glsa-200803-22.xml
+++ b/glsa-200803-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-22">
<title>LIVE555 Media Server: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Server.
</synopsis>
<product type="ebuild">live</product>
- <announced>March 13, 2008</announced>
- <revised>March 13, 2008: 01</revised>
+ <announced>2008-03-13</announced>
+ <revised>2008-03-13: 01</revised>
<bug>204065</bug>
<access>remote</access>
<affected>
@@ -46,22 +45,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/live-2008.02.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/live-2008.02.08"</code>
<p>
Note: Due to ABI changes, applications built against LIVE555 Media
Server such as VLC or MPlayer should also be rebuilt.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6036">CVE-2007-6036</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6036">CVE-2007-6036</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:52:57 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:52:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Mar 2008 12:26:32 +0000">
+ <metadata tag="submitter" timestamp="2008-03-11T12:26:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 12:27:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T12:27:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200803-23.xml b/glsa-200803-23.xml
index 8cd9f4dc..ae9908ba 100644
--- a/glsa-200803-23.xml
+++ b/glsa-200803-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-23">
<title>Website META Language: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
the Website META Language.
</synopsis>
<product type="ebuild">wml</product>
- <announced>March 15, 2008</announced>
- <revised>March 15, 2008: 01</revised>
+ <announced>2008-03-15</announced>
+ <revised>2008-03-15: 01</revised>
<bug>209927</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/wml-2.0.11-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/wml-2.0.11-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0665">CVE-2008-0665</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0666">CVE-2008-0666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0665">CVE-2008-0665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0666">CVE-2008-0666</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 22:05:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T22:05:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 22:05:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T22:05:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 20:18:51 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T20:18:51Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200803-24.xml b/glsa-200803-24.xml
index 8758b5aa..d2b86276 100644
--- a/glsa-200803-24.xml
+++ b/glsa-200803-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-24">
<title>PCRE: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">libpcre glib</product>
- <announced>March 17, 2008</announced>
- <revised>March 17, 2008: 02</revised>
+ <announced>2008-03-17</announced>
+ <revised>2008-03-17: 02</revised>
<bug>209067</bug>
<bug>209293</bug>
<access>remote</access>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.6-r1"</code>
<p>
All GLib users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.14.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.14.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 20:45:26 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T20:45:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Mar 2008 06:12:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-01T06:12:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 14:06:55 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T14:06:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200803-25.xml b/glsa-200803-25.xml
index c6592065..1e0b0e9f 100644
--- a/glsa-200803-25.xml
+++ b/glsa-200803-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-25">
<title>Dovecot: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
argument injection.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>212336</bug>
<bug>213030</bug>
<access>remote</access>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.0.13-r1"</code>
<p>
This version removes the "mail_extra_groups" option and introduces a
"mail_privileged_group" setting which is handled safely.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199">CVE-2008-1199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218">CVE-2008-1218</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199">CVE-2008-1199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218">CVE-2008-1218</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 18:35:36 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T18:35:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Mar 2008 01:34:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-12T01:34:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Mar 2008 11:19:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-18T11:19:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-26.xml b/glsa-200803-26.xml
index 0b6dcc3b..73196c89 100644
--- a/glsa-200803-26.xml
+++ b/glsa-200803-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-26">
<title>Adobe Acrobat Reader: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
Adobe Acrobat Reader.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>212367</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883">CVE-2008-0883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883">CVE-2008-0883</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Mar 2008 13:19:39 +0000">
+ <metadata tag="requester" timestamp="2008-03-16T13:19:39Z">
mfleming
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Mar 2008 11:44:20 +0000">
+ <metadata tag="submitter" timestamp="2008-03-17T11:44:20Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Mar 2008 13:28:58 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-18T13:28:58Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-27.xml b/glsa-200803-27.xml
index bea78816..850d7b69 100644
--- a/glsa-200803-27.xml
+++ b/glsa-200803-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-27">
<title>MoinMoin: Multiple vulnerabilities</title>
<synopsis>
Several vulnerabilities have been reported in MoinMoin Wiki Engine.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>209133</bug>
<access>remote</access>
<affected>
@@ -67,22 +66,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/moinmoin-1.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/moinmoin-1.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0780">CVE-2008-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0781">CVE-2008-0781</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0782">CVE-2008-0782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1098">CVE-2008-1098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1099">CVE-2008-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0780">CVE-2008-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0781">CVE-2008-0781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0782">CVE-2008-0782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1098">CVE-2008-1098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1099">CVE-2008-1099</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 09:02:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T09:02:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 09:03:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T09:03:06Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 19:53:09 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T19:53:09Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200803-28.xml b/glsa-200803-28.xml
index 3b8a80b1..d2224a29 100644
--- a/glsa-200803-28.xml
+++ b/glsa-200803-28.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-28">
<title>OpenLDAP: Denial of Service vulnerabilities</title>
<synopsis>
Multiple Denial of Service vulnerabilities have been reported in OpenLDAP.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>March 19, 2008</announced>
- <revised>March 19, 2008: 01</revised>
+ <announced>2008-03-19</announced>
+ <revised>2008-03-19: 01</revised>
<bug>197446</bug>
<bug>209677</bug>
<access>remote</access>
@@ -61,17 +60,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.41&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.41"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707">CVE-2007-5707</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708">CVE-2007-5708</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658">CVE-2008-0658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707">CVE-2007-5707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708">CVE-2007-5708</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658">CVE-2008-0658</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 17:57:19 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T17:57:19Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 19 Mar 2008 01:23:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-19T01:23:44Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-29.xml b/glsa-200803-29.xml
index e133e33f..5f8c741b 100644
--- a/glsa-200803-29.xml
+++ b/glsa-200803-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-29">
<title>ViewVC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by malicious people to bypass certain security restrictions.
</synopsis>
<product type="ebuild">viewvc</product>
- <announced>March 19, 2008</announced>
- <revised>April 01, 2009: 02</revised>
+ <announced>2008-03-19</announced>
+ <revised>2009-04-01: 02</revised>
<bug>212288</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/viewvc-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/viewvc-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290">CVE-2008-1290</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291">CVE-2008-1291</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292">CVE-2008-1292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290">CVE-2008-1290</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291">CVE-2008-1291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292">CVE-2008-1292</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 22:06:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T22:06:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 22:06:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T22:06:42Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 21:33:23 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T21:33:23Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200803-30.xml b/glsa-200803-30.xml
index f1802c8f..c8ba068e 100644
--- a/glsa-200803-30.xml
+++ b/glsa-200803-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-30">
<title>ssl-cert eclass: Certificate disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
allow for disclosure of generated SSL private keys.
</synopsis>
<product type="ebuild">ssl-cert.eclass</product>
- <announced>March 20, 2008</announced>
- <revised>March 20, 2008: 01</revised>
+ <announced>2008-03-20</announced>
+ <revised>2008-03-20: 01</revised>
<bug>174759</bug>
<access>remote</access>
<affected>
@@ -94,75 +93,75 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/conserver-8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/conserver-8.1.16"</code>
<p>
All Postfix 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.4.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.4.6-r2"</code>
<p>
All Postfix 2.3 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.3.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.3.8-r1"</code>
<p>
All Postfix 2.2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.2.11-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.2.11-r1"</code>
<p>
All Netkit FTP Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r7"</code>
<p>
All ejabberd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/ejabberd-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/ejabberd-1.1.3"</code>
<p>
All UnrealIRCd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/unrealircd-3.2.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/unrealircd-3.2.7-r2"</code>
<p>
All Cyrus IMAP Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.3.9-r1"</code>
<p>
All Dovecot users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.0.10"</code>
<p>
All stunnel 4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/stunnel-4.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/stunnel-4.21"</code>
<p>
All InterNetNews users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/inn-2.4.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/inn-2.4.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1383">CVE-2008-1383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1383">CVE-2008-1383</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Mar 2008 23:17:10 +0000">
+ <metadata tag="submitter" timestamp="2008-03-14T23:17:10Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Mar 2008 00:11:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-15T00:11:06Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-31.xml b/glsa-200803-31.xml
index 5f50a149..858924eb 100644
--- a/glsa-200803-31.xml
+++ b/glsa-200803-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-31">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>March 24, 2008</announced>
- <revised>March 24, 2008: 01</revised>
+ <announced>2008-03-24</announced>
+ <revised>2008-03-24: 01</revised>
<bug>199205</bug>
<bug>212363</bug>
<access>remote</access>
@@ -79,22 +78,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.6.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894">CVE-2007-5901</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971">CVE-2007-5971</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062">CVE-2008-0062</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063">CVE-2008-0063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947">CVE-2008-0947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894">CVE-2007-5901</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971">CVE-2007-5971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062">CVE-2008-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063">CVE-2008-0063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947">CVE-2008-0947</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Mar 2008 22:11:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-18T22:11:44Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Mar 2008 23:06:42 +0000">
+ <metadata tag="submitter" timestamp="2008-03-20T23:06:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Mar 2008 23:15:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-20T23:15:12Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200803-32.xml b/glsa-200803-32.xml
index 4c2e28e1..2bf7296c 100644
--- a/glsa-200803-32.xml
+++ b/glsa-200803-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-32">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>March 24, 2008</announced>
- <revised>March 24, 2008: 01</revised>
+ <announced>2008-03-24</announced>
+ <revised>2008-03-24: 01</revised>
<bug>212149</bug>
<access>remote</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070">CVE-2008-1070</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071">CVE-2008-1071</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072">CVE-2008-1072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070">CVE-2008-1070</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071">CVE-2008-1071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072">CVE-2008-1072</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:18:33 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:18:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 21:01:15 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T21:01:15Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Mar 2008 19:58:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-24T19:58:33Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200804-01.xml b/glsa-200804-01.xml
index 1a6f8380..e0685d2c 100644
--- a/glsa-200804-01.xml
+++ b/glsa-200804-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-01">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 01, 2008</announced>
- <revised>April 01, 2008: 01</revised>
+ <announced>2008-04-01</announced>
+ <revised>2008-04-01: 01</revised>
<bug>211449</bug>
<bug>212364</bug>
<bug>214068</bug>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047">CVE-2008-0047</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053">CVE-2008-0053</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882">CVE-2008-0882</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373">CVE-2008-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047">CVE-2008-0047</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053">CVE-2008-0053</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882">CVE-2008-0882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373">CVE-2008-1373</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:37:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:37:44Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Mar 2008 13:25:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-18T13:25:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Apr 2008 19:15:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-01T19:15:08Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-02.xml b/glsa-200804-02.xml
index 571559b1..b907f971 100644
--- a/glsa-200804-02.xml
+++ b/glsa-200804-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-02">
<title>bzip2: Denial of Service</title>
<synopsis>
A buffer overread vulnerability has been discovered in Bzip2.
</synopsis>
<product type="ebuild">bzip2</product>
- <announced>April 02, 2008</announced>
- <revised>April 02, 2008: 01</revised>
+ <announced>2008-04-02</announced>
+ <revised>2008-04-02: 01</revised>
<bug>213820</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/bzip2-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/bzip2-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:17:50 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:17:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 23:42:29 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T23:42:29Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Apr 2008 13:31:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-02T13:31:45Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-03.xml b/glsa-200804-03.xml
index d8f3291c..00dad43b 100644
--- a/glsa-200804-03.xml
+++ b/glsa-200804-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-03">
<title>OpenSSH: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
to escalate their privileges.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>April 05, 2008</announced>
- <revised>April 05, 2008: 01</revised>
+ <announced>2008-04-05</announced>
+ <revised>2008-04-05: 01</revised>
<bug>214985</bug>
<bug>215702</bug>
<access>local</access>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.7_p1-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.7_p1-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483">CVE-2008-1483</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657">CVE-2008-1657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483">CVE-2008-1483</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657">CVE-2008-1657</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Mar 2008 15:53:04 +0000">
+ <metadata tag="requester" timestamp="2008-03-31T15:53:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 21:55:34 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T21:55:34Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:39:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:39:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-04.xml b/glsa-200804-04.xml
index a5985363..a8b94b8f 100644
--- a/glsa-200804-04.xml
+++ b/glsa-200804-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-04">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 01</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 01</revised>
<bug>201669</bug>
<access>remote</access>
<affected>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969">CVE-2007-5969</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303">CVE-2007-6303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304">CVE-2007-6304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969">CVE-2007-5969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303">CVE-2007-6303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304">CVE-2007-6304</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Jan 2008 18:21:58 +0000">
+ <metadata tag="requester" timestamp="2008-01-28T18:21:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Feb 2008 20:29:29 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-09T20:29:29Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 23:20:56 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T23:20:56Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-05.xml b/glsa-200804-05.xml
index 75157ab5..4fbf48d3 100644
--- a/glsa-200804-05.xml
+++ b/glsa-200804-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-05">
<title>NX: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 02</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 02</revised>
<bug>210317</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.1.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.1.0-r2"</code>
<p>
All NX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.1.0-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:19:05 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:19:05Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:57:19 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:57:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:57:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:57:27Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-06.xml b/glsa-200804-06.xml
index 213731be..5b0f24cc 100644
--- a/glsa-200804-06.xml
+++ b/glsa-200804-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-06">
<title>UnZip: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">unzip</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 01</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 01</revised>
<bug>213761</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unzip-5.52-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unzip-5.52-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888">CVE-2008-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888">CVE-2008-0888</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 19:46:56 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T19:46:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:38:54 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:38:54Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:39:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:39:11Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-07.xml b/glsa-200804-07.xml
index 0df9ad4c..414799fb 100644
--- a/glsa-200804-07.xml
+++ b/glsa-200804-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-07">
<title>PECL APC: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">pecl-apc</product>
- <announced>April 09, 2008</announced>
- <revised>April 09, 2008: 01</revised>
+ <announced>2008-04-09</announced>
+ <revised>2008-04-09: 01</revised>
<bug>214576</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php5/pecl-apc-3.0.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php5/pecl-apc-3.0.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1488">CVE-2008-1488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1488">CVE-2008-1488</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Apr 2008 14:46:37 +0000">
+ <metadata tag="requester" timestamp="2008-04-03T14:46:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:16 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 23:31:29 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T23:31:29Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-08.xml b/glsa-200804-08.xml
index 4253efbe..cb9dbf0f 100644
--- a/glsa-200804-08.xml
+++ b/glsa-200804-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-08">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>April 10, 2008</announced>
- <revised>April 10, 2008: 01</revised>
+ <announced>2008-04-10</announced>
+ <revised>2008-04-10: 01</revised>
<bug>212930</bug>
<bug>214892</bug>
<access>remote</access>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.19-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.19-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270">CVE-2008-1270</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531">CVE-2008-1531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270">CVE-2008-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531">CVE-2008-1531</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:15:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:15:35Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:44:24 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:44:24Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Apr 2008 21:43:05 +0000">
+ <metadata tag="submitter" timestamp="2008-04-06T21:43:05Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200804-09.xml b/glsa-200804-09.xml
index 1a50d844..9c48b0e2 100644
--- a/glsa-200804-09.xml
+++ b/glsa-200804-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-09">
<title>am-utils: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">am-utils</product>
- <announced>April 10, 2008</announced>
- <revised>April 10, 2008: 01</revised>
+ <announced>2008-04-10</announced>
+ <revised>2008-04-10: 01</revised>
<bug>210158</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/am-utils-6.1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/am-utils-6.1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1078">CVE-2008-1078</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1078">CVE-2008-1078</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Apr 2008 21:38:37 +0000">
+ <metadata tag="requester" timestamp="2008-04-08T21:38:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Apr 2008 09:22:28 +0000">
+ <metadata tag="submitter" timestamp="2008-04-10T09:22:28Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:21:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:21:27Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200804-10.xml b/glsa-200804-10.xml
index 38d1378b..8d189d42 100644
--- a/glsa-200804-10.xml
+++ b/glsa-200804-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-10">
<title>Tomcat: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
session hijacking or information disclosure.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>April 10, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-04-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>196066</bug>
<bug>203169</bug>
<access>local, remote</access>
@@ -81,28 +80,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-5.5.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-5.5.26"</code>
<p>
All Tomcat 6.0.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-6.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-6.0.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333">CVE-2007-5333</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342">CVE-2007-5342</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461">CVE-2007-5461</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286">CVE-2007-6286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002">CVE-2008-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333">CVE-2007-5333</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342">CVE-2007-5342</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461">CVE-2007-5461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286">CVE-2007-6286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002">CVE-2008-0002</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:25:49 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:25:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 18:05:04 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T18:05:04Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Apr 2008 15:09:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-04T15:09:23Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200804-11.xml b/glsa-200804-11.xml
index b7d4db38..ae380513 100644
--- a/glsa-200804-11.xml
+++ b/glsa-200804-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-11">
<title>policyd-weight: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attack.
</synopsis>
<product type="ebuild">policyd-weight</product>
- <announced>April 11, 2008</announced>
- <revised>April 11, 2008: 01</revised>
+ <announced>2008-04-11</announced>
+ <revised>2008-04-11: 01</revised>
<bug>214403</bug>
<access>local</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/policyd-weight-0.1.14.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/policyd-weight-0.1.14.17"</code>
<p>
This version changes the default path for sockets to
"/var/run/policyd-weight", which is only writable by a privileged user.
@@ -57,15 +56,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1569">CVE-2008-1569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1569">CVE-2008-1569</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:06:42 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:06:42Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2008 07:47:13 +0000">
+ <metadata tag="submitter" timestamp="2008-04-07T07:47:13Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Apr 2008 07:47:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-07T07:47:40Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-12.xml b/glsa-200804-12.xml
index 22f036ed..7d81cc39 100644
--- a/glsa-200804-12.xml
+++ b/glsa-200804-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-12">
<title>gnome-screensaver: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
configurations.
</synopsis>
<product type="ebuild">gnome-screensaver</product>
- <announced>April 11, 2008</announced>
- <revised>April 11, 2008: 01</revised>
+ <announced>2008-04-11</announced>
+ <revised>2008-04-11: 01</revised>
<bug>213940</bug>
<access>local</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/gnome-screensaver-2.20.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/gnome-screensaver-2.20.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887">CVE-2008-0887</uri>
- <uri link="/security/en/glsa/glsa-200705-14.xml">GLSA 200705-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887">CVE-2008-0887</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-14.xml">GLSA 200705-14</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 09 Apr 2008 17:28:36 +0000">
+ <metadata tag="submitter" timestamp="2008-04-09T17:28:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:16:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:16:15Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200804-13.xml b/glsa-200804-13.xml
index 721ebba5..ba529ccd 100644
--- a/glsa-200804-13.xml
+++ b/glsa-200804-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-13">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
injection, session hijacking and unauthorized usage.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>April 14, 2008</announced>
- <revised>April 14, 2008: 01</revised>
+ <announced>2008-04-14</announced>
+ <revised>2008-04-14: 01</revised>
<bug>200792</bug>
<bug>202733</bug>
<bug>213883</bug>
@@ -62,20 +61,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6170">CVE-2007-6170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6430">CVE-2007-6430</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332">CVE-2008-1332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6170">CVE-2007-6170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6430">CVE-2007-6430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332">CVE-2008-1332</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:11:29 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:11:29Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:50:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2008 07:59:17 +0000">
+ <metadata tag="submitter" timestamp="2008-04-07T07:59:17Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-14.xml b/glsa-200804-14.xml
index 80491b0e..d01b4419 100644
--- a/glsa-200804-14.xml
+++ b/glsa-200804-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-14">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>April 14, 2008</announced>
- <revised>April 14, 2008: 01</revised>
+ <announced>2008-04-14</announced>
+ <revised>2008-04-14: 01</revised>
<bug>216022</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761">CVE-2008-1761</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762">CVE-2008-1762</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1764">CVE-2008-1764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761">CVE-2008-1761</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762">CVE-2008-1762</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1764">CVE-2008-1764</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 13 Apr 2008 00:02:37 +0000">
+ <metadata tag="submitter" timestamp="2008-04-13T00:02:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Apr 2008 00:02:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-13T00:02:49Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-15.xml b/glsa-200804-15.xml
index e845d01d..cd90ca7b 100644
--- a/glsa-200804-15.xml
+++ b/glsa-200804-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-15">
<title>libpng: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
certain applications that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>April 15, 2008</announced>
- <revised>April 15, 2008: 01</revised>
+ <announced>2008-04-15</announced>
+ <revised>2008-04-15: 01</revised>
<bug>217047</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.26-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.26-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Apr 2008 01:44:56 +0000">
+ <metadata tag="requester" timestamp="2008-04-14T01:44:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 01:49:03 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T01:49:03Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 08:39:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T08:39:38Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200804-16.xml b/glsa-200804-16.xml
index e71f3231..32133621 100644
--- a/glsa-200804-16.xml
+++ b/glsa-200804-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-16">
<title>rsync: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code when extended attributes are being used.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>216887</bug>
<access>remote</access>
<affected>
@@ -59,18 +58,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.9-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.9-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720">CVE-2008-1720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720">CVE-2008-1720</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Apr 2008 22:37:35 +0000">
+ <metadata tag="requester" timestamp="2008-04-14T22:37:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 23:01:29 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T23:01:29Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 23:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T23:01:42Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-17.xml b/glsa-200804-17.xml
index f456bdbd..d4a12071 100644
--- a/glsa-200804-17.xml
+++ b/glsa-200804-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-17">
<title>Speex: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities in multiple player applications.
</synopsis>
<product type="ebuild">speex</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>217715</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/speex-1.2_beta3_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/speex-1.2_beta3_p2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686">CVE-2008-1686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686">CVE-2008-1686</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 09:58:14 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T09:58:14Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 09:58:25 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T09:58:25Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Apr 2008 10:58:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-17T10:58:23Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-18.xml b/glsa-200804-18.xml
index 07c5e7ee..ea5b95d9 100644
--- a/glsa-200804-18.xml
+++ b/glsa-200804-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-18">
<title>Poppler: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 02</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 02</revised>
<bug>216850</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693">CVE-2008-1693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693">CVE-2008-1693</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 01:16:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T01:16:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 11:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T11:28:12Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-19.xml b/glsa-200804-19.xml
index 77addfb1..12787d2e 100644
--- a/glsa-200804-19.xml
+++ b/glsa-200804-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-19">
<title>PHP Toolkit: Data disclosure and Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure on Apache, and a Denial of Service.
</synopsis>
<product type="ebuild">php-toolkit</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>209535</bug>
<access>local</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/php-toolkit-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/php-toolkit-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1734">CVE-2008-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1734">CVE-2008-1734</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Apr 2008 23:54:47 +0000">
+ <metadata tag="requester" timestamp="2008-04-07T23:54:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:22:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:22:11Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Apr 2008 19:26:49 +0000">
+ <metadata tag="submitter" timestamp="2008-04-11T19:26:49Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-20.xml b/glsa-200804-20.xml
index 43b8a0e3..bc24b53e 100644
--- a/glsa-200804-20.xml
+++ b/glsa-200804-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-20">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">sun-jdk, sun-jre-bin, emul-linux-x86-java</product>
- <announced>April 17, 2008</announced>
- <revised>March 05, 2010: 06</revised>
+ <announced>2008-04-17</announced>
+ <revised>2010-03-05: 06</revised>
<bug>178851</bug>
<bug>178962</bug>
<bug>183580</bug>
@@ -140,93 +139,93 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.05"</code>
<p>
All Sun JRE 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.15"</code>
<p>
All Sun JRE 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.17"</code>
<p>
All Sun JDK 1.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.05"</code>
<p>
All Sun JDK 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.15"</code>
<p>
All Sun JDK 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.17"</code>
<p>
All emul-linux-x86-java 1.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.05"</code>
<p>
All emul-linux-x86-java 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.15"</code>
<p>
All emul-linux-x86-java 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.4.2.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655">CVE-2007-3655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232">CVE-2007-5232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237">CVE-2007-5237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238">CVE-2007-5238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239">CVE-2007-5239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240">CVE-2007-5240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273">CVE-2007-5273</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274">CVE-2007-5274</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5689">CVE-2007-5689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0628">CVE-2008-0628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0657">CVE-2008-0657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185">CVE-2008-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186">CVE-2008-1186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187">CVE-2008-1187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188">CVE-2008-1188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189">CVE-2008-1189</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190">CVE-2008-1190</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191">CVE-2008-1191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192">CVE-2008-1192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193">CVE-2008-1193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194">CVE-2008-1194</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195">CVE-2008-1195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196">CVE-2008-1196</uri>
- <uri link="/security/en/glsa/glsa-200705-23.xml">GLSA 200705-23</uri>
- <uri link="/security/en/glsa/glsa-200706-08.xml">GLSA 200706-08</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655">CVE-2007-3655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232">CVE-2007-5232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237">CVE-2007-5237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238">CVE-2007-5238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239">CVE-2007-5239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240">CVE-2007-5240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273">CVE-2007-5273</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274">CVE-2007-5274</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5689">CVE-2007-5689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0628">CVE-2008-0628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0657">CVE-2008-0657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185">CVE-2008-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186">CVE-2008-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187">CVE-2008-1187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188">CVE-2008-1188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189">CVE-2008-1189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190">CVE-2008-1190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191">CVE-2008-1191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192">CVE-2008-1192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193">CVE-2008-1193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194">CVE-2008-1194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195">CVE-2008-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196">CVE-2008-1196</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-23.xml">GLSA 200705-23</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200706-08.xml">GLSA 200706-08</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:23:49 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:23:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:33:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Sep 2007 23:51:30 +0000">
+ <metadata tag="submitter" timestamp="2007-09-09T23:51:30Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-21.xml b/glsa-200804-21.xml
index ed0ba6eb..099749af 100644
--- a/glsa-200804-21.xml
+++ b/glsa-200804-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-21">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>April 18, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-04-18</announced>
+ <revised>2009-05-28: 02</revised>
<bug>204344</bug>
<access>remote</access>
<affected>
@@ -81,24 +80,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.124.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.124.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071">CVE-2007-0071</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019">CVE-2007-6019</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637">CVE-2007-6637</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654">CVE-2008-1654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655">CVE-2008-1655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071">CVE-2007-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019">CVE-2007-6019</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637">CVE-2007-6637</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654">CVE-2008-1654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655">CVE-2008-1655</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 10:39:32 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T10:39:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:16:42 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:16:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:18:41 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:18:41Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-22.xml b/glsa-200804-22.xml
index 800269af..8f2768de 100644
--- a/glsa-200804-22.xml
+++ b/glsa-200804-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-22">
<title>PowerDNS Recursor: DNS Cache Poisoning</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning.
</synopsis>
<product type="ebuild">pdns-recursor</product>
- <announced>April 18, 2008</announced>
- <revised>August 21, 2008: 03</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-08-21: 03</revised>
<bug>215567</bug>
<bug>231335</bug>
<access>remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-recursor-3.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-recursor-3.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637">CVE-2008-1637</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3217">CVE-2008-3217</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637">CVE-2008-1637</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3217">CVE-2008-3217</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 20:12:08 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T20:12:08Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:27:35 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:27:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:27:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:27:43Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-23.xml b/glsa-200804-23.xml
index 2e0da052..716074fd 100644
--- a/glsa-200804-23.xml
+++ b/glsa-200804-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-23">
<title>CUPS: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 18, 2008</announced>
- <revised>April 18, 2008: 01</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-04-18: 01</revised>
<bug>217232</bug>
<access>remote, local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722">CVE-2008-1722</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722">CVE-2008-1722</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 10:26:38 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T10:26:38Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 10:26:47 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T10:26:47Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Apr 2008 11:05:44 +0000">
+ <metadata tag="submitter" timestamp="2008-04-17T11:05:44Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200804-24.xml b/glsa-200804-24.xml
index a2e31366..29332c77 100644
--- a/glsa-200804-24.xml
+++ b/glsa-200804-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-24">
<title>DBmail: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
under certain configurations.
</synopsis>
<product type="ebuild">dbmail</product>
- <announced>April 18, 2008</announced>
- <revised>April 18, 2008: 01</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-04-18: 01</revised>
<bug>218154</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dbmail-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dbmail-2.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6714">CVE-2007-6714</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6714">CVE-2007-6714</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Apr 2008 08:54:02 +0000">
+ <metadata tag="requester" timestamp="2008-04-18T08:54:02Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 09:20:04 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T09:20:04Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 14:01:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T14:01:09Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-25.xml b/glsa-200804-25.xml
index bc8f268b..8381df56 100644
--- a/glsa-200804-25.xml
+++ b/glsa-200804-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-25">
<title>VLC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>April 23, 2008</announced>
- <revised>April 23, 2008: 01</revised>
+ <announced>2008-04-23</announced>
+ <revised>2008-04-23: 01</revised>
<bug>214277</bug>
<bug>214627</bug>
<access>remote</access>
@@ -70,24 +69,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6f"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489">CVE-2008-1489</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768">CVE-2008-1768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769">CVE-2008-1769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881">CVE-2008-1881</uri>
- <uri link="/security/en/glsa/glsa-200803-13.xml">GLSA 200803-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489">CVE-2008-1489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768">CVE-2008-1768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769">CVE-2008-1769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881">CVE-2008-1881</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200803-13.xml">GLSA 200803-13</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2008 19:42:45 +0000">
+ <metadata tag="requester" timestamp="2008-03-24T19:42:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 00:49:24 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T00:49:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 00:56:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T00:56:14Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-26.xml b/glsa-200804-26.xml
index 5f74dd9a..43bb781f 100644
--- a/glsa-200804-26.xml
+++ b/glsa-200804-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-26">
<title>Openfire: Denial of Service</title>
<synopsis>
A design error in Openfire might lead to a Denial of Service.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>April 23, 2008</announced>
- <revised>April 23, 2008: 01</revised>
+ <announced>2008-04-23</announced>
+ <revised>2008-04-23: 01</revised>
<bug>217234</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/openfire-3.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/openfire-3.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1728">CVE-2008-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1728">CVE-2008-1728</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 20:09:13 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T20:09:13Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:33:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:33:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:33:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:33:32Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-27.xml b/glsa-200804-27.xml
index 812d39c3..2c841714 100644
--- a/glsa-200804-27.xml
+++ b/glsa-200804-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-27">
<title>SILC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for Denial of Service and execution of arbitrary code.
</synopsis>
<product type="ebuild">silc-toolkit silc-client silc-server</product>
- <announced>April 24, 2008</announced>
- <revised>April 24, 2008: 01</revised>
+ <announced>2008-04-24</announced>
+ <revised>2008-04-24: 01</revised>
<bug>212362</bug>
<bug>214116</bug>
<bug>214812</bug>
@@ -71,32 +70,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-toolkit-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-toolkit-1.1.7"</code>
<p>
All SILC Client users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-client-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-client-1.1.4"</code>
<p>
All SILC Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-server-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-server-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227">CVE-2008-1227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1429">CVE-2008-1429</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552">CVE-2008-1552</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227">CVE-2008-1227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1429">CVE-2008-1429</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552">CVE-2008-1552</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:19:53 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:19:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 16:41:55 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T16:41:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200804-28.xml b/glsa-200804-28.xml
index 777fd55b..61f97491 100644
--- a/glsa-200804-28.xml
+++ b/glsa-200804-28.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-28">
<title>JRockit: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in BEA JRockit.
</synopsis>
<product type="ebuild">jrockit-jdk-bin</product>
- <announced>April 24, 2008</announced>
- <revised>April 24, 2008: 01</revised>
+ <announced>2008-04-24</announced>
+ <revised>2008-04-24: 01</revised>
<bug>218226</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.4.2.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.4.2.16"</code>
<p>
All JRockit 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.5.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.5.0.14"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Apr 2008 16:40:01 +0000">
+ <metadata tag="requester" timestamp="2008-04-23T16:40:01Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 17:27:24 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T17:27:24Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Apr 2008 17:27:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-23T17:27:42Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200804-29.xml b/glsa-200804-29.xml
index 1c4df7d9..f8bf3908 100644
--- a/glsa-200804-29.xml
+++ b/glsa-200804-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-29">
<title>Comix: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
commands and a Denial of Service.
</synopsis>
<product type="ebuild">comix</product>
- <announced>April 25, 2008</announced>
- <revised>April 25, 2008: 01</revised>
+ <announced>2008-04-25</announced>
+ <revised>2008-04-25: 01</revised>
<bug>215694</bug>
<access>local, remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/comix-3.6.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/comix-3.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1568">CVE-2008-1568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1796">CVE-2008-1796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1568">CVE-2008-1568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1796">CVE-2008-1796</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Apr 2008 14:29:23 +0000">
+ <metadata tag="requester" timestamp="2008-04-10T14:29:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Apr 2008 22:35:39 +0000">
+ <metadata tag="submitter" timestamp="2008-04-10T22:35:39Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Apr 2008 23:01:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-13T23:01:03Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200804-30.xml b/glsa-200804-30.xml
index 5cde3bb1..0035c156 100644
--- a/glsa-200804-30.xml
+++ b/glsa-200804-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-30">
<title>KDE start_kdeinit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>April 29, 2008</announced>
- <revised>April 08, 2009: 02</revised>
+ <announced>2008-04-29</announced>
+ <revised>2009-04-08: 02</revised>
<bug>218933</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.5.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671">CVE-2008-1671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671">CVE-2008-1671</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 24 Apr 2008 09:52:59 +0000">
+ <metadata tag="submitter" timestamp="2008-04-24T09:52:59Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Apr 2008 13:20:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-28T13:20:59Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200805-01.xml b/glsa-200805-01.xml
index 3c482acf..c5da8ee8 100644
--- a/glsa-200805-01.xml
+++ b/glsa-200805-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-01">
<title>Horde Application Framework: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacker to bypass security restrictions.
</synopsis>
<product type="ebuild">horde</product>
- <announced>May 05, 2008</announced>
- <revised>May 05, 2008: 01</revised>
+ <announced>2008-05-05</announced>
+ <revised>2008-05-05: 01</revised>
<bug>212635</bug>
<bug>213493</bug>
<access>remote</access>
@@ -82,48 +81,48 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.7"</code>
<p>
All horde-groupware users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-groupware-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-groupware-1.0.5"</code>
<p>
All horde-kronolith users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-2.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-2.1.7"</code>
<p>
All horde-mnemo users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-mnemo-2.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-mnemo-2.1.2"</code>
<p>
All horde-nag users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-nag-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-nag-2.1.4"</code>
<p>
All horde-webmail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-webmail-1.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-webmail-1.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284">CVE-2008-1284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284">CVE-2008-1284</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:23:06 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:23:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Apr 2008 11:40:54 +0000">
+ <metadata tag="submitter" timestamp="2008-04-26T11:40:54Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200805-02.xml b/glsa-200805-02.xml
index 1cba8f54..63262ae6 100644
--- a/glsa-200805-02.xml
+++ b/glsa-200805-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-02">
<title>phpMyAdmin: Information disclosure</title>
<synopsis>
A vulnerability in phpMyAdmin may lead to information disclosure.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>May 05, 2008</announced>
- <revised>May 05, 2008: 01</revised>
+ <announced>2008-05-05</announced>
+ <revised>2008-05-05: 01</revised>
<bug>219005</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924">CVE-2008-1924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924">CVE-2008-1924</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:00:15 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:00:15Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 13:00:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T13:00:26Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 18:38:43 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T18:38:43Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200805-03.xml b/glsa-200805-03.xml
index a441b82b..9edc2f16 100644
--- a/glsa-200805-03.xml
+++ b/glsa-200805-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-03">
<title>Multiple X11 terminals: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
rxvt-unicode, and wterm, allowing for local privilege escalation.
</synopsis>
<product type="ebuild">aterm eterm rxvt mrxvt multi-aterm wterm rxvt-unicode</product>
- <announced>May 07, 2008</announced>
- <revised>May 10, 2008: 02</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-10: 02</revised>
<bug>216833</bug>
<bug>217819</bug>
<bug>219746</bug>
@@ -80,55 +79,55 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/aterm-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/aterm-1.0.1-r1"</code>
<p>
All Eterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/eterm-0.9.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/eterm-0.9.4-r1"</code>
<p>
All Mrxvt users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/mrxvt-0.5.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/mrxvt-0.5.3-r2"</code>
<p>
All multi-aterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/multi-aterm-0.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/multi-aterm-0.2.1-r1"</code>
<p>
All RXVT users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-2.7.10-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-2.7.10-r4"</code>
<p>
All rxvt-unicode users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-unicode-9.02-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-unicode-9.02-r1"</code>
<p>
All wterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/wterm-6.2.9-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/wterm-6.2.9-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142">CVE-2008-1142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1692">CVE-2008-1692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142">CVE-2008-1142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1692">CVE-2008-1692</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:00:54 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:00:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 13:12:03 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T13:12:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 18:53:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T18:53:21Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200805-04.xml b/glsa-200805-04.xml
index d6fe062b..d91a2213 100644
--- a/glsa-200805-04.xml
+++ b/glsa-200805-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-04">
<title>eGroupWare: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">egroupware</product>
- <announced>May 07, 2008</announced>
- <revised>May 07, 2008: 01</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-07: 01</revised>
<bug>214212</bug>
<bug>218625</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.4.004&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.4.004"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502">CVE-2008-1502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2041">CVE-2008-2041</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502">CVE-2008-1502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2041">CVE-2008-2041</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 12:58:46 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T12:58:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 13:57:44 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T13:57:44Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 14:01:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T14:01:45Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200805-05.xml b/glsa-200805-05.xml
index c0ac3950..10ba84cf 100644
--- a/glsa-200805-05.xml
+++ b/glsa-200805-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-05">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>May 07, 2008</announced>
- <revised>May 07, 2008: 01</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-07: 01</revised>
<bug>215276</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561">CVE-2008-1561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562">CVE-2008-1562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563">CVE-2008-1563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561">CVE-2008-1561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562">CVE-2008-1562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563">CVE-2008-1563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:11:47 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:11:47Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 13:12:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T13:12:26Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 15:31:30 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T15:31:30Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200805-06.xml b/glsa-200805-06.xml
index cd76dbd6..f3e56972 100644
--- a/glsa-200805-06.xml
+++ b/glsa-200805-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-06">
<title>Firebird: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
verifying credentials.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>216158</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r6"</code>
<p>
Note: /etc/conf.d is protected by Portage as a configuration directory.
Do not forget to use "<i>etc-update</i>" or "<i>dispatch-conf</i>" to
@@ -57,12 +56,12 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1880">CVE-2008-1880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1880">CVE-2008-1880</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 02:05:02 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T02:05:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Apr 2008 09:22:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-15T09:22:33Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200805-07.xml b/glsa-200805-07.xml
index 4618e477..3dc2a473 100644
--- a/glsa-200805-07.xml
+++ b/glsa-200805-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-07">
<title>Linux Terminal Server Project: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
LTSP which allow remote attackers to compromise terminal clients.
</synopsis>
<product type="ebuild">ltsp</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>215699</bug>
<access>remote</access>
<affected>
@@ -63,24 +62,24 @@
</p>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200705-02.xml">GLSA 200705-02</uri>
- <uri link="/security/en/glsa/glsa-200705-06.xml">GLSA 200705-06</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
- <uri link="/security/en/glsa/glsa-200705-24.xml">GLSA 200705-24</uri>
- <uri link="/security/en/glsa/glsa-200710-06.xml">GLSA 200710-06</uri>
- <uri link="/security/en/glsa/glsa-200710-16.xml">GLSA 200710-16</uri>
- <uri link="/security/en/glsa/glsa-200710-30.xml">GLSA 200710-30</uri>
- <uri link="/security/en/glsa/glsa-200711-08.xml">GLSA 200711-08</uri>
- <uri link="/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-02.xml">GLSA 200705-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-06.xml">GLSA 200705-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-24.xml">GLSA 200705-24</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-06.xml">GLSA 200710-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-16.xml">GLSA 200710-16</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-30.xml">GLSA 200710-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-08.xml">GLSA 200711-08</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
<uri link="https://bugs.gentoo.org/177580">Gentoo bug 177580: Port LTSP 5 to Gentoo</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Apr 2008 19:23:11 +0000">
+ <metadata tag="requester" timestamp="2008-04-01T19:23:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:37 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:37Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:27:26 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:27:26Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-08.xml b/glsa-200805-08.xml
index 8ec2763b..89054dd5 100644
--- a/glsa-200805-08.xml
+++ b/glsa-200805-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-08">
<title>InspIRCd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">inspircd</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>215704</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/inspircd-1.1.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/inspircd-1.1.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1925">CVE-2008-1925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1925">CVE-2008-1925</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 May 2008 14:50:35 +0000">
+ <metadata tag="requester" timestamp="2008-05-06T14:50:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 May 2008 19:30:15 +0000">
+ <metadata tag="submitter" timestamp="2008-05-06T19:30:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 May 2008 19:30:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-06T19:30:22Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-09.xml b/glsa-200805-09.xml
index ed7ccc04..17d63ae9 100644
--- a/glsa-200805-09.xml
+++ b/glsa-200805-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-09">
<title>MoinMoin: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>May 11, 2008</announced>
- <revised>May 11, 2008: 01</revised>
+ <announced>2008-05-11</announced>
+ <revised>2008-05-11: 01</revised>
<bug>218752</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/moinmoin-1.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/moinmoin-1.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1937">CVE-2008-1937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1937">CVE-2008-1937</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 May 2008 22:43:27 +0000">
+ <metadata tag="requester" timestamp="2008-05-07T22:43:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 22:49:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T22:49:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 May 2008 14:03:55 +0000">
+ <metadata tag="submitter" timestamp="2008-05-09T14:03:55Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-10.xml b/glsa-200805-10.xml
index 9be35dc1..2893e0f2 100644
--- a/glsa-200805-10.xml
+++ b/glsa-200805-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-10">
<title>Pngcrush: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pngcrush</product>
- <announced>May 11, 2008</announced>
- <revised>May 11, 2008: 01</revised>
+ <announced>2008-05-11</announced>
+ <revised>2008-05-11: 01</revised>
<bug>219033</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/pngcrush-1.6.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/pngcrush-1.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="/security/en/glsa/glsa-200804-15.xml">GLSA 200804-15</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-15.xml">GLSA 200804-15</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 May 2008 21:28:49 +0000">
+ <metadata tag="requester" timestamp="2008-05-05T21:28:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 May 2008 21:29:02 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-05T21:29:02Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 May 2008 14:19:10 +0000">
+ <metadata tag="submitter" timestamp="2008-05-09T14:19:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-11.xml b/glsa-200805-11.xml
index f572178f..9b975682 100644
--- a/glsa-200805-11.xml
+++ b/glsa-200805-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-11">
<title>Chicken: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">chicken</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>198979</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-scheme/chicken-3.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-scheme/chicken-3.1.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 May 2008 11:47:42 +0000">
+ <metadata tag="requester" timestamp="2008-05-12T11:47:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 11:47:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T11:47:52Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 12:10:35 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T12:10:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-12.xml b/glsa-200805-12.xml
index 10389ad5..f20673c4 100644
--- a/glsa-200805-12.xml
+++ b/glsa-200805-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-12">
<title>Blender: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>219008</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.43-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.43-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1102">CVE-2008-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1103">CVE-2008-1103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1102">CVE-2008-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1103">CVE-2008-1103</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 May 2008 13:10:27 +0000">
+ <metadata tag="requester" timestamp="2008-05-11T13:10:27Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 11:15:05 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T11:15:05Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 11:15:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T11:15:14Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-13.xml b/glsa-200805-13.xml
index 8f954def..f5940881 100644
--- a/glsa-200805-13.xml
+++ b/glsa-200805-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-13">
<title>PTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or overwriting arbitrary files.
</synopsis>
<product type="ebuild">ptex</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>196673</bug>
<access>remote</access>
<affected>
@@ -51,23 +50,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.10_p20071203&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.10_p20071203"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
- <uri link="/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
- <uri link="/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 May 2008 22:31:38 +0000">
+ <metadata tag="requester" timestamp="2008-05-07T22:31:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 22:32:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T22:32:17Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 11:34:22 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T11:34:22Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-14.xml b/glsa-200805-14.xml
index 2a6c5d75..f04b58f2 100644
--- a/glsa-200805-14.xml
+++ b/glsa-200805-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-14">
<title>Common Data Format library: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Format library.
</synopsis>
<product type="ebuild">cdf</product>
- <announced>May 13, 2008</announced>
- <revised>May 13, 2008: 01</revised>
+ <announced>2008-05-13</announced>
+ <revised>2008-05-13: 01</revised>
<bug>220391</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-libs/cdf-3.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-libs/cdf-3.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2080">CVE-2008-2080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2080">CVE-2008-2080</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 May 2008 18:49:47 +0000">
+ <metadata tag="requester" timestamp="2008-05-11T18:49:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 10:41:41 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T10:41:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 10:41:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T10:41:52Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-15.xml b/glsa-200805-15.xml
index 022befa5..78a4feb6 100644
--- a/glsa-200805-15.xml
+++ b/glsa-200805-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-15">
<title>libid3tag: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was found in libid3tag.
</synopsis>
<product type="ebuild">libid3tag</product>
- <announced>May 14, 2008</announced>
- <revised>May 14, 2008: 01</revised>
+ <announced>2008-05-14</announced>
+ <revised>2008-05-14: 01</revised>
<bug>210564</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libid3tag-0.15.1b-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libid3tag-0.15.1b-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109">CVE-2008-2109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109">CVE-2008-2109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 May 2008 20:49:10 +0000">
+ <metadata tag="requester" timestamp="2008-05-13T20:49:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 May 2008 20:57:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-13T20:57:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 May 2008 21:27:22 +0000">
+ <metadata tag="submitter" timestamp="2008-05-13T21:27:22Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200805-16.xml b/glsa-200805-16.xml
index f9ef6db7..082257f5 100644
--- a/glsa-200805-16.xml
+++ b/glsa-200805-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-16">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>May 14, 2008</announced>
- <revised>May 14, 2008: 02</revised>
+ <announced>2008-05-14</announced>
+ <revised>2008-05-14: 02</revised>
<bug>218080</bug>
<access>remote</access>
<affected>
@@ -79,30 +78,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.4.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745">CVE-2007-5745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5746">CVE-2007-5746</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747">CVE-2007-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320">CVE-2008-0320</uri>
- <uri link="/security/en/glsa/glsa-200803-20.xml">GLSA 200803-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745">CVE-2007-5745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5746">CVE-2007-5746</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747">CVE-2007-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320">CVE-2008-0320</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200803-20.xml">GLSA 200803-20</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 12:59:56 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T12:59:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 May 2008 17:40:20 +0000">
+ <metadata tag="submitter" timestamp="2008-05-08T17:40:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 08 May 2008 17:40:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-08T17:40:49Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-17.xml b/glsa-200805-17.xml
index 1565ba37..82877877 100644
--- a/glsa-200805-17.xml
+++ b/glsa-200805-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-17">
<title>Perl: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">perl libperl</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>219203</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/perl-5.8.8-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/perl-5.8.8-r5"</code>
<p>
All libperl users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/libperl-5.8.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/libperl-5.8.8-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927">CVE-2008-1927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927">CVE-2008-1927</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 May 2008 10:42:17 +0000">
+ <metadata tag="requester" timestamp="2008-05-17T10:42:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 May 2008 10:42:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-17T10:42:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2008 13:52:28 +0000">
+ <metadata tag="submitter" timestamp="2008-05-17T13:52:28Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200805-18.xml b/glsa-200805-18.xml
index a6f62b31..0a086c92 100644
--- a/glsa-200805-18.xml
+++ b/glsa-200805-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-18">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox mozilla-firefox-bin seamonkey seamonkey-bin mozilla-thunderbird mozilla-thunderbird-bin xulrunner</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>208128</bug>
<bug>214816</bug>
<bug>218065</bug>
@@ -199,44 +198,44 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.14"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.14"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.14"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.14"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.9-r1"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.9"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.14"</code>
<p>
NOTE: The crash vulnerability (CVE-2008-1380) is currently unfixed in
the SeaMonkey binary ebuild, as no precompiled packages have been
@@ -246,35 +245,35 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879">CVE-2007-4879</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304">CVE-2008-0304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412">CVE-2008-0412</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413">CVE-2008-0413</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414">CVE-2008-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415">CVE-2008-0415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416">CVE-2008-0416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417">CVE-2008-0417</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418">CVE-2008-0418</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419">CVE-2008-0419</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420">CVE-2008-0420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591">CVE-2008-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592">CVE-2008-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593">CVE-2008-0593</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594">CVE-2008-0594</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233">CVE-2008-1233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234">CVE-2008-1234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235">CVE-2008-1235</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236">CVE-2008-1236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237">CVE-2008-1237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238">CVE-2008-1238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240">CVE-2008-1240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241">CVE-2008-1241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879">CVE-2007-4879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304">CVE-2008-0304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412">CVE-2008-0412</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413">CVE-2008-0413</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414">CVE-2008-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415">CVE-2008-0415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416">CVE-2008-0416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417">CVE-2008-0417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418">CVE-2008-0418</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419">CVE-2008-0419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420">CVE-2008-0420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591">CVE-2008-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592">CVE-2008-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593">CVE-2008-0593</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594">CVE-2008-0594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233">CVE-2008-1233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234">CVE-2008-1234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235">CVE-2008-1235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236">CVE-2008-1236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237">CVE-2008-1237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238">CVE-2008-1238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240">CVE-2008-1240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241">CVE-2008-1241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 27 Mar 2008 03:40:04 +0000">
+ <metadata tag="submitter" timestamp="2008-03-27T03:40:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 May 2008 21:13:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-20T21:13:08Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-19.xml b/glsa-200805-19.xml
index 601f6575..ddca127c 100644
--- a/glsa-200805-19.xml
+++ b/glsa-200805-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-19">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>213762</bug>
<access>remote</access>
<affected>
@@ -80,21 +79,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.93&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.93"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314">CVE-2008-0314</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100">CVE-2008-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387">CVE-2008-1387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833">CVE-2008-1833</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835">CVE-2008-1835</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836">CVE-2008-1836</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837">CVE-2008-1837</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314">CVE-2008-0314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100">CVE-2008-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387">CVE-2008-1387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833">CVE-2008-1833</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835">CVE-2008-1835</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836">CVE-2008-1836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837">CVE-2008-1837</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 May 2008 18:45:19 +0000">
+ <metadata tag="submitter" timestamp="2008-05-14T18:45:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 May 2008 18:56:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-14T18:56:12Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-20.xml b/glsa-200805-20.xml
index d7647ce2..be55b851 100644
--- a/glsa-200805-20.xml
+++ b/glsa-200805-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-20">
<title>GnuTLS: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
daemons using GnuTLS.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>May 21, 2008</announced>
- <revised>May 21, 2008: 01</revised>
+ <announced>2008-05-21</announced>
+ <revised>2008-05-21: 01</revised>
<bug>222823</bug>
<access>remote</access>
<affected>
@@ -64,17 +63,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948">CVE-2008-1948</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949">CVE-2008-1949</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950">CVE-2008-1950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948">CVE-2008-1948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949">CVE-2008-1949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950">CVE-2008-1950</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 May 2008 16:44:10 +0000">
+ <metadata tag="submitter" timestamp="2008-05-20T16:44:10Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 May 2008 16:32:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-21T16:32:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200805-21.xml b/glsa-200805-21.xml
index 0f3123be..02887083 100644
--- a/glsa-200805-21.xml
+++ b/glsa-200805-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-21">
<title>Roundup: Permission bypass</title>
<synopsis>
A vulnerability in Roundup allows for bypassing permission restrictions.
</synopsis>
<product type="ebuild">roundup</product>
- <announced>May 27, 2008</announced>
- <revised>May 27, 2008: 01</revised>
+ <announced>2008-05-27</announced>
+ <revised>2008-05-27: 01</revised>
<bug>212488</bug>
<bug>214666</bug>
<access>remote</access>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/roundup-1.4.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/roundup-1.4.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1474">CVE-2008-1474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1475">CVE-2008-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1474">CVE-2008-1474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1475">CVE-2008-1475</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 May 2008 15:24:06 +0000">
+ <metadata tag="requester" timestamp="2008-05-19T15:24:06Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 May 2008 19:07:57 +0000">
+ <metadata tag="submitter" timestamp="2008-05-21T19:07:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 May 2008 09:03:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-22T09:03:17Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-22.xml b/glsa-200805-22.xml
index ecabb226..23c38fcf 100644
--- a/glsa-200805-22.xml
+++ b/glsa-200805-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-22">
<title>MPlayer: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 29, 2008</announced>
- <revised>May 29, 2008: 01</revised>
+ <announced>2008-05-29</announced>
+ <revised>2008-05-29: 01</revised>
<bug>215006</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p26753&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p26753"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558">CVE-2008-1558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558">CVE-2008-1558</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 May 2008 17:37:55 +0000">
+ <metadata tag="requester" timestamp="2008-05-22T17:37:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:32:21 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:32:21Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 28 May 2008 13:57:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-28T13:57:42Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200805-23.xml b/glsa-200805-23.xml
index 599cddbb..2baafe4c 100644
--- a/glsa-200805-23.xml
+++ b/glsa-200805-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-23">
<title>Samba: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>May 29, 2008</announced>
- <revised>May 29, 2008: 01</revised>
+ <announced>2008-05-29</announced>
+ <revised>2008-05-29: 01</revised>
<bug>222299</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.28a-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.28a-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 May 2008 15:20:30 +0000">
+ <metadata tag="requester" timestamp="2008-05-27T15:20:30Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:23:53 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:23:53Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 May 2008 13:07:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-29T13:07:54Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200806-01.xml b/glsa-200806-01.xml
index f2b4b6ed..9a7ad511 100644
--- a/glsa-200806-01.xml
+++ b/glsa-200806-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-01">
<title>mtr: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mtr</product>
- <announced>June 03, 2008</announced>
- <revised>June 03, 2008: 01</revised>
+ <announced>2008-06-03</announced>
+ <revised>2008-06-03: 01</revised>
<bug>223017</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/mtr-0.73-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/mtr-0.73-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357">CVE-2008-2357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357">CVE-2008-2357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 May 2008 19:29:01 +0000">
+ <metadata tag="requester" timestamp="2008-05-26T19:29:01Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:17:06 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:17:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Jun 2008 21:28:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-02T21:28:08Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200806-02.xml b/glsa-200806-02.xml
index 29f0e7ff..7704825d 100644
--- a/glsa-200806-02.xml
+++ b/glsa-200806-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-02">
<title>libxslt: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>June 03, 2008</announced>
- <revised>June 03, 2008: 01</revised>
+ <announced>2008-06-03</announced>
+ <revised>2008-06-03: 01</revised>
<bug>222499</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxslt-1.1.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxslt-1.1.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767">CVE-2008-1767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767">CVE-2008-1767</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 May 2008 20:52:43 +0000">
+ <metadata tag="requester" timestamp="2008-05-27T20:52:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:07:25 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:07:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Jun 2008 21:27:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-02T21:27:22Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200806-03.xml b/glsa-200806-03.xml
index 6c450370..fb690f6c 100644
--- a/glsa-200806-03.xml
+++ b/glsa-200806-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-03">
<title>Imlib 2: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>June 08, 2008</announced>
- <revised>June 08, 2008: 01</revised>
+ <announced>2008-06-08</announced>
+ <revised>2008-06-08: 01</revised>
<bug>223965</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426">CVE-2008-2426</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426">CVE-2008-2426</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 May 2008 09:11:57 +0000">
+ <metadata tag="requester" timestamp="2008-05-31T09:11:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jun 2008 07:11:46 +0000">
+ <metadata tag="submitter" timestamp="2008-06-03T07:11:46Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Jun 2008 17:06:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-06T17:06:14Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200806-04.xml b/glsa-200806-04.xml
index b1427f2e..03f028e7 100644
--- a/glsa-200806-04.xml
+++ b/glsa-200806-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-04">
<title>rdesktop: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">rdesktop</product>
- <announced>June 14, 2008</announced>
- <revised>June 14, 2008: 01</revised>
+ <announced>2008-06-14</announced>
+ <revised>2008-06-14: 01</revised>
<bug>220911</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rdesktop-1.6.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rdesktop-1.6.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801">CVE-2008-1801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802">CVE-2008-1802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803">CVE-2008-1803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801">CVE-2008-1801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802">CVE-2008-1802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803">CVE-2008-1803</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 May 2008 15:23:05 +0000">
+ <metadata tag="requester" timestamp="2008-05-19T15:23:05Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:21:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:21:36Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Jun 2008 15:00:31 +0000">
+ <metadata tag="submitter" timestamp="2008-06-07T15:00:31Z">
mfleming
</metadata>
</glsa>
diff --git a/glsa-200806-05.xml b/glsa-200806-05.xml
index 002d2f2e..21c9e9b6 100644
--- a/glsa-200806-05.xml
+++ b/glsa-200806-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-05">
<title>cbrPager: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cbrpager</product>
- <announced>June 16, 2008</announced>
- <revised>June 16, 2008: 01</revised>
+ <announced>2008-06-16</announced>
+ <revised>2008-06-16: 01</revised>
<bug>223657</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/cbrpager-0.9.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/cbrpager-0.9.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2575">CVE-2008-2575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2575">CVE-2008-2575</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 May 2008 17:48:23 +0000">
+ <metadata tag="requester" timestamp="2008-05-28T17:48:23Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:18:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:18:59Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2008 21:12:52 +0000">
+ <metadata tag="submitter" timestamp="2008-06-14T21:12:52Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200806-06.xml b/glsa-200806-06.xml
index 9bb574cb..d91967ec 100644
--- a/glsa-200806-06.xml
+++ b/glsa-200806-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-06">
<title>Evolution: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>June 16, 2008</announced>
- <revised>June 16, 2008: 01</revised>
+ <announced>2008-06-16</announced>
+ <revised>2008-06-16: 01</revised>
<bug>223963</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.12.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.12.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108">CVE-2008-1108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109">CVE-2008-1109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108">CVE-2008-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109">CVE-2008-1109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jun 2008 15:11:52 +0000">
+ <metadata tag="requester" timestamp="2008-06-03T15:11:52Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 05 Jun 2008 10:04:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-05T10:04:23Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2008 21:39:04 +0000">
+ <metadata tag="submitter" timestamp="2008-06-14T21:39:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200806-07.xml b/glsa-200806-07.xml
index 3bb7ff82..a2aba493 100644
--- a/glsa-200806-07.xml
+++ b/glsa-200806-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-07">
<title>X.Org X server: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>June 19, 2008</announced>
- <revised>June 19, 2008: 01</revised>
+ <announced>2008-06-19</announced>
+ <revised>2008-06-19: 01</revised>
<bug>225419</bug>
<access>remote, local</access>
<affected>
@@ -63,14 +62,14 @@
places:
</p>
<code>
- Section &quot;Extensions&quot;
- Option &quot;MIT-SHM&quot; &quot;disable&quot;
- Option &quot;RENDER&quot; &quot;disable&quot;
- Option &quot;SECURITY&quot; &quot;disable&quot;
+ Section "Extensions"
+ Option "MIT-SHM" "disable"
+ Option "RENDER" "disable"
+ Option "SECURITY" "disable"
EndSection
- Section &quot;Module&quot;
- Disable &quot;record&quot;
+ Section "Module"
+ Disable "record"
EndSection</code>
</workaround>
<resolution>
@@ -79,19 +78,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360">CVE-2008-2360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361">CVE-2008-2361</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362">CVE-2008-2362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360">CVE-2008-2360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361">CVE-2008-2361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362">CVE-2008-2362</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Jun 2008 10:16:02 +0000">
+ <metadata tag="submitter" timestamp="2008-06-11T10:16:02Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 08:09:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T08:09:32Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200806-08.xml b/glsa-200806-08.xml
index ef630c7f..b347bf8d 100644
--- a/glsa-200806-08.xml
+++ b/glsa-200806-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-08">
<title>OpenSSL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenSSL.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>June 23, 2008</announced>
- <revised>June 23, 2008: 01</revised>
+ <announced>2008-06-23</announced>
+ <revised>2008-06-23: 01</revised>
<bug>223429</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8g-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8g-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891">CVE-2008-0891</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672">CVE-2008-1672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891">CVE-2008-0891</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672">CVE-2008-1672</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2008 22:48:49 +0000">
+ <metadata tag="requester" timestamp="2008-06-16T22:48:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:22:26 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:22:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:22:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:22:36Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200806-09.xml b/glsa-200806-09.xml
index fbb4cfdc..2a118102 100644
--- a/glsa-200806-09.xml
+++ b/glsa-200806-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-09">
<title>libvorbis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>June 23, 2008</announced>
- <revised>June 23, 2008: 02</revised>
+ <announced>2008-06-23</announced>
+ <revised>2008-06-23: 02</revised>
<bug>222085</bug>
<access>remote</access>
<affected>
@@ -67,20 +66,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419">CVE-2008-1419</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420">CVE-2008-1420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423">CVE-2008-1423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419">CVE-2008-1419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420">CVE-2008-1420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423">CVE-2008-1423</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2008 22:45:51 +0000">
+ <metadata tag="requester" timestamp="2008-06-16T22:45:51Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:30:07 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:30:07Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:30:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:30:17Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200806-10.xml b/glsa-200806-10.xml
index 0028bb0c..7c6fbbe8 100644
--- a/glsa-200806-10.xml
+++ b/glsa-200806-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-10">
<title>FreeType: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>June 23, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-06-23</announced>
+ <revised>2009-05-28: 03</revised>
<bug>225851</bug>
<access>remote</access>
<affected>
@@ -64,20 +63,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806">CVE-2008-1806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807">CVE-2008-1807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808">CVE-2008-1808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806">CVE-2008-1806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807">CVE-2008-1807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808">CVE-2008-1808</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jun 2008 09:20:25 +0000">
+ <metadata tag="requester" timestamp="2008-06-12T09:20:25Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jun 2008 00:04:48 +0000">
+ <metadata tag="submitter" timestamp="2008-06-17T00:04:48Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jun 2008 00:04:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-17T00:04:59Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200806-11.xml b/glsa-200806-11.xml
index d9192931..50e013ef 100644
--- a/glsa-200806-11.xml
+++ b/glsa-200806-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-11">
<title>IBM JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">ibm-jdk-bin ibm-jre-bin</product>
- <announced>June 25, 2008</announced>
- <revised>June 25, 2008: 01</revised>
+ <announced>2008-06-25</announced>
+ <revised>2008-06-25: 01</revised>
<bug>186277</bug>
<bug>198644</bug>
<bug>216112</bug>
@@ -62,36 +61,36 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jdk-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jdk-bin-1.5.0.7"</code>
<p>
All IBM JDK 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jdk-bin-1.4.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jdk-bin-1.4.2.11"</code>
<p>
All IBM JRE 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jre-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jre-bin-1.5.0.7"</code>
<p>
All IBM JRE 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jre-bin-1.4.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jre-bin-1.4.2.11"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Apr 2008 22:14:16 +0000">
+ <metadata tag="requester" timestamp="2008-04-05T22:14:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 17:16:09 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T17:16:09Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Jun 2008 01:10:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-24T01:10:44Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200807-01.xml b/glsa-200807-01.xml
index 02d4da4d..ca3e11c0 100644
--- a/glsa-200807-01.xml
+++ b/glsa-200807-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-01">
<title>Python: Multiple integer overflows</title>
<synopsis>
Multiple integer overflows may allow for Denial of Service.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 01, 2008</announced>
- <revised>July 01, 2008: 01</revised>
+ <announced>2008-07-01</announced>
+ <revised>2008-07-01: 01</revised>
<bug>216673</bug>
<bug>217221</bug>
<access>remote</access>
@@ -65,23 +64,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r6"</code>
<p>
All Python 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679">CVE-2008-1679</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721">CVE-2008-1721</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887">CVE-2008-1887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679">CVE-2008-1679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721">CVE-2008-1721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887">CVE-2008-1887</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2008 08:54:25 +0000">
+ <metadata tag="submitter" timestamp="2008-06-27T08:54:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jul 2008 11:46:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-01T11:46:03Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200807-02.xml b/glsa-200807-02.xml
index 58d97db5..36fc1ee5 100644
--- a/glsa-200807-02.xml
+++ b/glsa-200807-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-02">
<title>Motion: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">motion</product>
- <announced>July 01, 2008</announced>
- <revised>July 01, 2008: 01</revised>
+ <announced>2008-07-01</announced>
+ <revised>2008-07-01: 01</revised>
<bug>227053</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/motion-3.2.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/motion-3.2.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2654">CVE-2008-2654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2654">CVE-2008-2654</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jun 2008 00:58:06 +0000">
+ <metadata tag="requester" timestamp="2008-06-24T00:58:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2008 11:12:50 +0000">
+ <metadata tag="submitter" timestamp="2008-06-25T11:12:50Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jul 2008 11:55:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-01T11:55:40Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200807-03.xml b/glsa-200807-03.xml
index 6e490c09..bdc430ee 100644
--- a/glsa-200807-03.xml
+++ b/glsa-200807-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-03">
<title>PCRE: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">libpcre glib</product>
- <announced>July 07, 2008</announced>
- <revised>July 07, 2008: 01</revised>
+ <announced>2008-07-07</announced>
+ <revised>2008-07-07: 01</revised>
<bug>228091</bug>
<bug>230039</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.7-r1"</code>
<p>
All GLib users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.16.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.16.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 00:02:02 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T00:02:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 00:02:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T00:02:22Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200807-04.xml b/glsa-200807-04.xml
index b6701e05..37656e32 100644
--- a/glsa-200807-04.xml
+++ b/glsa-200807-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-04">
<title>Poppler: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>July 08, 2008</announced>
- <revised>July 08, 2008: 01</revised>
+ <announced>2008-07-08</announced>
+ <revised>2008-07-08: 01</revised>
<bug>229931</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950">CVE-2008-2950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950">CVE-2008-2950</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 09:09:47 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T09:09:47Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jul 2008 18:44:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-08T18:44:36Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-200807-05.xml b/glsa-200807-05.xml
index 80459b53..adb9dd0e 100644
--- a/glsa-200807-05.xml
+++ b/glsa-200807-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-05">
<title>OpenOffice.org: User-assisted execution of arbitrary code</title>
<synopsis>
An integer overflow vulnerability has been reported in OpenOffice.org.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>225723</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.4.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2152">CVE-2008-2152</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2152">CVE-2008-2152</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jul 2008 07:24:43 +0000">
+ <metadata tag="requester" timestamp="2008-07-07T07:24:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 07:24:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T07:24:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 11:42:11 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T11:42:11Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-06.xml b/glsa-200807-06.xml
index 245f79bd..7113b0c6 100644
--- a/glsa-200807-06.xml
+++ b/glsa-200807-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-06">
<title>Apache: Denial of Service</title>
<synopsis>
Multiple vulnerabilities in Apache might lead to a Denial of Service.
</synopsis>
<product type="ebuild">apache</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>222643</bug>
<bug>227111</bug>
<access>remote</access>
@@ -65,20 +64,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420">CVE-2007-6420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678">CVE-2008-1678</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364">CVE-2008-2364</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420">CVE-2007-6420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678">CVE-2008-1678</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364">CVE-2008-2364</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2008 10:47:39 +0000">
+ <metadata tag="requester" timestamp="2008-06-14T10:47:39Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:51:04 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:51:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:51:13 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:51:13Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200807-07.xml b/glsa-200807-07.xml
index eb132e99..4da2d92e 100644
--- a/glsa-200807-07.xml
+++ b/glsa-200807-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-07">
<title>NX: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>230147</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.2.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.2.0-r3"</code>
<p>
All NX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.2.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.2.0-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200806-07.xml">GLSA 200806-07</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200806-07.xml">GLSA 200806-07</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 00:06:37 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T00:06:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 00:06:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T00:06:48Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200807-08.xml b/glsa-200807-08.xml
index bb76d7c5..4c2f3215 100644
--- a/glsa-200807-08.xml
+++ b/glsa-200807-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-08">
<title>BIND: Cache poisoning</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning on recursive resolvers.
</synopsis>
<product type="ebuild">bind</product>
- <announced>July 11, 2008</announced>
- <revised>July 11, 2008: 01</revised>
+ <announced>2008-07-11</announced>
+ <revised>2008-07-11: 01</revised>
<bug>231201</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.2_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.2_p1"</code>
<p>
Note: In order to utilize the query port randomization to mitigate the
weakness, you need to make sure that your network setup allows the DNS
@@ -59,15 +58,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Jul 2008 08:55:27 +0000">
+ <metadata tag="requester" timestamp="2008-07-09T08:55:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jul 2008 14:42:45 +0000">
+ <metadata tag="submitter" timestamp="2008-07-09T14:42:45Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Jul 2008 17:35:39 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-11T17:35:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200807-09.xml b/glsa-200807-09.xml
index c5e720cb..ae7898da 100644
--- a/glsa-200807-09.xml
+++ b/glsa-200807-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-09">
<title>Mercurial: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">mercurial</product>
- <announced>July 15, 2008</announced>
- <revised>July 15, 2008: 01</revised>
+ <announced>2008-07-15</announced>
+ <revised>2008-07-15: 01</revised>
<bug>230193</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/mercurial-1.0.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/mercurial-1.0.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2942">CVE-2008-2942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2942">CVE-2008-2942</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:37:24 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:37:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jul 2008 11:41:04 +0000">
+ <metadata tag="submitter" timestamp="2008-07-15T11:41:04Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jul 2008 11:48:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-15T11:48:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-10.xml b/glsa-200807-10.xml
index e1b7c967..110adca0 100644
--- a/glsa-200807-10.xml
+++ b/glsa-200807-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-10">
<title>Bacula: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">bacula</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>196834</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5626">CVE-2007-5626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5626">CVE-2007-5626</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:41:52 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:41:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jul 2008 11:29:18 +0000">
+ <metadata tag="submitter" timestamp="2008-07-15T11:29:18Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jul 2008 11:29:25 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-15T11:29:25Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-11.xml b/glsa-200807-11.xml
index 59ec71b4..778311a3 100644
--- a/glsa-200807-11.xml
+++ b/glsa-200807-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-11">
<title>PeerCast: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>220281</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1218-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1218-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2040">CVE-2008-2040</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2040">CVE-2008-2040</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Jul 2008 00:36:04 +0000">
+ <metadata tag="requester" timestamp="2008-07-08T00:36:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Jul 2008 19:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-12T19:41:58Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jul 2008 15:19:30 +0000">
+ <metadata tag="submitter" timestamp="2008-07-20T15:19:30Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-12.xml b/glsa-200807-12.xml
index 3e152a5f..9e2336e4 100644
--- a/glsa-200807-12.xml
+++ b/glsa-200807-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-12">
<title>BitchX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or symlink attacks.
</synopsis>
<product type="ebuild">bitchx</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>190667</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
the vulnerable package and switch to another IRC client:
</p>
<code>
- # emerge --unmerge &quot;net-irc/bitchx&quot;</code>
+ # emerge --unmerge "net-irc/bitchx"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4584">CVE-2007-4584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5839">CVE-2007-5839</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4584">CVE-2007-4584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5839">CVE-2007-5839</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jul 2008 22:27:23 +0000">
+ <metadata tag="requester" timestamp="2008-07-07T22:27:23Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 22:27:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T22:27:35Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Jul 2008 11:41:45 +0000">
+ <metadata tag="submitter" timestamp="2008-07-17T11:41:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-13.xml b/glsa-200807-13.xml
index 681d231e..8b9fa009 100644
--- a/glsa-200807-13.xml
+++ b/glsa-200807-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-13">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>221959</bug>
<bug>230692</bug>
<access>local, remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6i&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6i"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147">CVE-2008-2147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430">CVE-2008-2430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147">CVE-2008-2147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430">CVE-2008-2430</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 May 2008 17:39:12 +0000">
+ <metadata tag="requester" timestamp="2008-05-22T17:39:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:20:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:20:33Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:52:52 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:52:52Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-14.xml b/glsa-200807-14.xml
index b4500667..fd3e521d 100644
--- a/glsa-200807-14.xml
+++ b/glsa-200807-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-14">
<title>Linux Audit: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">audit</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>215705</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/audit-1.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/audit-1.7.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628">CVE-2008-1628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628">CVE-2008-1628</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 21 Jul 2008 20:07:20 +0000">
+ <metadata tag="submitter" timestamp="2008-07-21T20:07:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Jul 2008 20:07:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-21T20:07:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-15.xml b/glsa-200807-15.xml
index 204adbf1..673b3e80 100644
--- a/glsa-200807-15.xml
+++ b/glsa-200807-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-15">
<title>Pan: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pan</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>224051</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/pan-0.132-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/pan-0.132-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2363">CVE-2008-2363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2363">CVE-2008-2363</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jul 2008 08:32:55 +0000">
+ <metadata tag="requester" timestamp="2008-07-01T08:32:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:13:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:13:53Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:35:24 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:35:24Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200807-16.xml b/glsa-200807-16.xml
index cb9cae48..3149b0ac 100644
--- a/glsa-200807-16.xml
+++ b/glsa-200807-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-16">
<title>Python: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 31, 2008</announced>
- <revised>July 19, 2009: 02</revised>
+ <announced>2008-07-31</announced>
+ <revised>2009-07-19: 02</revised>
<bug>230640</bug>
<bug>232137</bug>
<access>remote</access>
@@ -78,13 +77,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r14"</code>
<p>
All Python 2.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.5.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.5.2-r6"</code>
<p>
Please note that Python 2.3 is masked since June 24, and we will not be
releasing updates to it. It will be removed from the tree in the near
@@ -92,16 +91,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315">CVE-2008-2315</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316">CVE-2008-2316</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142">CVE-2008-3142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143">CVE-2008-3143</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144">CVE-2008-3144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315">CVE-2008-2315</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316">CVE-2008-2316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142">CVE-2008-3142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143">CVE-2008-3143</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144">CVE-2008-3144</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 31 Jul 2008 15:42:37 +0000">
+ <metadata tag="submitter" timestamp="2008-07-31T15:42:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Jul 2008 15:45:02 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-31T15:45:02Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-01.xml b/glsa-200808-01.xml
index 4d8a4b0c..9c5b823b 100644
--- a/glsa-200808-01.xml
+++ b/glsa-200808-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-01">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>213039</bug>
<bug>214270</bug>
<bug>218059</bug>
@@ -68,20 +67,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482">CVE-2008-1482</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878">CVE-2008-1878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482">CVE-2008-1482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878">CVE-2008-1878</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2008 19:44:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-24T19:44:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 20:23:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T20:23:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 00:56:00 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T00:56:00Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-02.xml b/glsa-200808-02.xml
index d136e888..bd4c9453 100644
--- a/glsa-200808-02.xml
+++ b/glsa-200808-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-02">
<title>Net-SNMP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
snmpd and execution of arbitrary code in Perl applications using Net-SMNP.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>222265</bug>
<bug>225105</bug>
<access>remote</access>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960">CVE-2008-0960</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292">CVE-2008-2292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960">CVE-2008-0960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292">CVE-2008-2292</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jul 2008 11:15:36 +0000">
+ <metadata tag="requester" timestamp="2008-07-02T11:15:36Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:09:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:09:07Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 08:46:03 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T08:46:03Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-03.xml b/glsa-200808-03.xml
index a3e3f882..e3b9a502 100644
--- a/glsa-200808-03.xml
+++ b/glsa-200808-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-03">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox mozilla-firefox-bin mozilla-thunderbird mozilla-thunderbird-bin seamonkey seamonkey-bin xulrunner xulrunner-bin</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>204337</bug>
<bug>218065</bug>
<bug>230567</bug>
@@ -172,76 +171,76 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.16"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.16"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.16"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.16"</code>
<p>
All Seamonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.11"</code>
<p>
All Seamonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.11"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.16"</code>
<p>
All XULRunner binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-bin-1.8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-bin-1.8.1.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785">CVE-2008-2785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798">CVE-2008-2798</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799">CVE-2008-2799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800">CVE-2008-2800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801">CVE-2008-2801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802">CVE-2008-2802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803">CVE-2008-2803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805">CVE-2008-2805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807">CVE-2008-2807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808">CVE-2008-2808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809">CVE-2008-2809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810">CVE-2008-2810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811">CVE-2008-2811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933">CVE-2008-2933</uri>
- <uri link="/security/en/glsa/glsa-200805-18.xml">GLSA 200805-18</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785">CVE-2008-2785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798">CVE-2008-2798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799">CVE-2008-2799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800">CVE-2008-2800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801">CVE-2008-2801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802">CVE-2008-2802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803">CVE-2008-2803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805">CVE-2008-2805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807">CVE-2008-2807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808">CVE-2008-2808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809">CVE-2008-2809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810">CVE-2008-2810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811">CVE-2008-2811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933">CVE-2008-2933</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA 200805-18</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:09:54 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:09:54Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Jul 2008 20:08:31 +0000">
+ <metadata tag="submitter" timestamp="2008-07-30T20:08:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Aug 2008 00:34:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-06T00:34:26Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-04.xml b/glsa-200808-04.xml
index ebd0a774..2df5b260 100644
--- a/glsa-200808-04.xml
+++ b/glsa-200808-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-04">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>230411</bug>
<bug>231587</bug>
<access>remote</access>
@@ -52,23 +51,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137">CVE-2008-3137</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138">CVE-2008-3138</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139">CVE-2008-3139</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140">CVE-2008-3140</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141">CVE-2008-3141</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145">CVE-2008-3145</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137">CVE-2008-3137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138">CVE-2008-3138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139">CVE-2008-3139</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140">CVE-2008-3140</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141">CVE-2008-3141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145">CVE-2008-3145</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:40:07 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:40:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Jul 2008 18:25:58 +0000">
+ <metadata tag="submitter" timestamp="2008-07-30T18:25:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Jul 2008 18:26:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-30T18:26:07Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-05.xml b/glsa-200808-05.xml
index 3fb94164..d8b3ccb7 100644
--- a/glsa-200808-05.xml
+++ b/glsa-200808-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-05">
<title>ISC DHCP: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was discovered in ISC DHCP.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>227135</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jul 2008 08:33:40 +0000">
+ <metadata tag="requester" timestamp="2008-07-01T08:33:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:11:49Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Aug 2008 23:00:13 +0000">
+ <metadata tag="submitter" timestamp="2008-08-01T23:00:13Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200808-06.xml b/glsa-200808-06.xml
index 6c53293b..0ace84d7 100644
--- a/glsa-200808-06.xml
+++ b/glsa-200808-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-06">
<title>libxslt: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>232172</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxslt-1.1.24-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxslt-1.1.24-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935">CVE-2008-2935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935">CVE-2008-2935</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Jul 2008 23:42:58 +0000">
+ <metadata tag="requester" timestamp="2008-07-31T23:42:58Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Aug 2008 23:18:29 +0000">
+ <metadata tag="submitter" timestamp="2008-08-01T23:18:29Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 01 Aug 2008 23:18:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-01T23:18:48Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200808-07.xml b/glsa-200808-07.xml
index d6bb0eb0..e8fb8449 100644
--- a/glsa-200808-07.xml
+++ b/glsa-200808-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-07">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
Multiple vulnerabilities in ClamAV may result in a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 08, 2008</announced>
- <revised>August 08, 2008: 01</revised>
+ <announced>2008-08-08</announced>
+ <revised>2008-08-08: 01</revised>
<bug>204340</bug>
<bug>227351</bug>
<access>remote</access>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.93.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.93.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595">CVE-2007-6595</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713">CVE-2008-2713</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3215">CVE-2008-3215</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595">CVE-2007-6595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713">CVE-2008-2713</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3215">CVE-2008-3215</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Aug 2008 21:50:46 +0000">
+ <metadata tag="requester" timestamp="2008-08-03T21:50:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 21:44:31 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T21:44:31Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 21:46:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T21:46:23Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200808-08.xml b/glsa-200808-08.xml
index 267e2766..99b5f68a 100644
--- a/glsa-200808-08.xml
+++ b/glsa-200808-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-08">
<title>stunnel: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
certificate which would be published by OCSP.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>August 08, 2008</announced>
- <revised>August 09, 2009: 02</revised>
+ <announced>2008-08-08</announced>
+ <revised>2009-08-09: 02</revised>
<bug>222805</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/stunnel-4.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/stunnel-4.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2420">CVE-2008-2420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2420">CVE-2008-2420</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Aug 2008 21:53:49 +0000">
+ <metadata tag="requester" timestamp="2008-08-03T21:53:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 21:07:35 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T21:07:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 21:08:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T21:08:30Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200808-09.xml b/glsa-200808-09.xml
index 5ca22245..8daef47e 100644
--- a/glsa-200808-09.xml
+++ b/glsa-200808-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-09">
<title>OpenLDAP: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>August 08, 2008</announced>
- <revised>August 08, 2008: 01</revised>
+ <announced>2008-08-08</announced>
+ <revised>2008-08-08: 01</revised>
<bug>230269</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.43"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952">CVE-2008-2952</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952">CVE-2008-2952</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 20:53:02 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T20:53:02Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 20:54:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T20:54:49Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200808-10.xml b/glsa-200808-10.xml
index dfc60490..c3ec1739 100644
--- a/glsa-200808-10.xml
+++ b/glsa-200808-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-10">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
PDF.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 09, 2008</announced>
- <revised>August 09, 2008: 01</revised>
+ <announced>2008-08-09</announced>
+ <revised>2008-08-09: 01</revised>
<bug>233383</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641">CVE-2008-2641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641">CVE-2008-2641</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 06 Aug 2008 23:14:17 +0000">
+ <metadata tag="submitter" timestamp="2008-08-06T23:14:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Aug 2008 23:14:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-06T23:14:50Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200808-11.xml b/glsa-200808-11.xml
index 05c441f4..4a3d2222 100644
--- a/glsa-200808-11.xml
+++ b/glsa-200808-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-11">
<title>UUDeview: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">nzbget uudeview</product>
- <announced>August 11, 2008</announced>
- <revised>August 11, 2008: 01</revised>
+ <announced>2008-08-11</announced>
+ <revised>2008-08-11: 01</revised>
<bug>222275</bug>
<bug>224193</bug>
<access>local</access>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/uudeview-0.5.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/uudeview-0.5.20-r1"</code>
<p>
All NZBget users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=news-nntp/nzbget-0.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=news-nntp/nzbget-0.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2266">CVE-2008-2266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2266">CVE-2008-2266</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:30:42 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:30:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Jul 2008 18:32:00 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-06T18:32:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:22:12 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:22:12Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200808-12.xml b/glsa-200808-12.xml
index d6214d78..598453bf 100644
--- a/glsa-200808-12.xml
+++ b/glsa-200808-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-12">
<title>Postfix: Local privilege escalation vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
root privileges.
</synopsis>
<product type="ebuild">postfix</product>
- <announced>August 14, 2008</announced>
- <revised>October 23, 2008: 02</revised>
+ <announced>2008-08-14</announced>
+ <revised>2008-10-23: 02</revised>
<bug>232642</bug>
<access>local</access>
<affected>
@@ -108,17 +107,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.5.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.5.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936">CVE-2008-2936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937">CVE-2008-2937</uri>
- <uri link="http://article.gmane.org/gmane.mail.postfix.announce/110">Official Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936">CVE-2008-2936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937">CVE-2008-2937</uri>
+ <uri link="https://article.gmane.org/gmane.mail.postfix.announce/110">Official Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Aug 2008 13:13:26 +0000">
+ <metadata tag="submitter" timestamp="2008-08-14T13:13:26Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Aug 2008 22:37:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-14T22:37:03Z">
falco
</metadata>
</glsa>
diff --git a/glsa-200809-01.xml b/glsa-200809-01.xml
index 0ef8bf3e..aee91aad 100644
--- a/glsa-200809-01.xml
+++ b/glsa-200809-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-01">
<title>yelp: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
opening a URI, for example through Firefox.
</synopsis>
<product type="ebuild">yelp</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>234079</bug>
<access>remote</access>
<affected>
@@ -48,24 +47,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/yelp-2.22.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/yelp-2.22.1-r2"</code>
<p>
All yelp users running GNOME 2.20 should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/yelp-2.20.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/yelp-2.20.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3533">CVE-2008-3533</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3533">CVE-2008-3533</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Aug 2008 14:25:26 +0000">
+ <metadata tag="requester" timestamp="2008-08-15T14:25:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:34:23 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:34:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:34:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:34:31Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200809-02.xml b/glsa-200809-02.xml
index d38a3f16..d3391f00 100644
--- a/glsa-200809-02.xml
+++ b/glsa-200809-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-02">
<title>dnsmasq: Denial of Service and DNS spoofing</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing of DNS replies.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>231282</bug>
<bug>232523</bug>
<access>remote</access>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.45&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.45"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3350">CVE-2008-3350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3350">CVE-2008-3350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jul 2008 19:25:11 +0000">
+ <metadata tag="requester" timestamp="2008-07-13T19:25:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:52:40 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:52:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:52:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:52:59Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200809-03.xml b/glsa-200809-03.xml
index ce9e8be4..f3b11638 100644
--- a/glsa-200809-03.xml
+++ b/glsa-200809-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-03">
<title>RealPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>232997</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-11.0.0.4028-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-11.0.0.4028-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400">CVE-2007-5400</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400">CVE-2007-5400</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:23:04 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:23:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:23:18 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:23:18Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200809-04.xml b/glsa-200809-04.xml
index 8b12fefb..79f3c371 100644
--- a/glsa-200809-04.xml
+++ b/glsa-200809-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-04">
<title>MySQL: Privilege bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
access to other databases.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>220399</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.60-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.60-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079">CVE-2008-2079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079">CVE-2008-2079</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 20 Aug 2008 00:05:23 +0000">
+ <metadata tag="submitter" timestamp="2008-08-20T00:05:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Aug 2008 15:32:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-21T15:32:52Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200809-05.xml b/glsa-200809-05.xml
index c4e95694..cf0d6b37 100644
--- a/glsa-200809-05.xml
+++ b/glsa-200809-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-05">
<title>Courier Authentication Library: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Authentication Library.
</synopsis>
<product type="ebuild">courier-authlib</product>
- <announced>September 05, 2008</announced>
- <revised>September 05, 2008: 01</revised>
+ <announced>2008-09-05</announced>
+ <revised>2008-09-05: 01</revised>
<bug>225407</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/courier-authlib-0.60.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/courier-authlib-0.60.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667">CVE-2008-2667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667">CVE-2008-2667</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Aug 2008 18:54:58 +0000">
+ <metadata tag="requester" timestamp="2008-08-11T18:54:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Aug 2008 18:56:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-11T18:56:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Aug 2008 21:07:13 +0000">
+ <metadata tag="submitter" timestamp="2008-08-28T21:07:13Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-06.xml b/glsa-200809-06.xml
index bd1813c3..4f6675d0 100644
--- a/glsa-200809-06.xml
+++ b/glsa-200809-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-06">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>September 07, 2008</announced>
- <revised>September 07, 2008: 01</revised>
+ <announced>2008-09-07</announced>
+ <revised>2008-09-07: 01</revised>
<bug>235238</bug>
<bug>235589</bug>
<access>remote</access>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6i-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6i-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732">CVE-2008-3732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794">CVE-2008-3794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732">CVE-2008-3732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794">CVE-2008-3794</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Aug 2008 18:33:15 +0000">
+ <metadata tag="requester" timestamp="2008-08-25T18:33:15Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Aug 2008 18:33:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-25T18:33:23Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Aug 2008 20:55:29 +0000">
+ <metadata tag="submitter" timestamp="2008-08-28T20:55:29Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-07.xml b/glsa-200809-07.xml
index e3d499a0..7b8d3204 100644
--- a/glsa-200809-07.xml
+++ b/glsa-200809-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-07">
<title>libTIFF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>September 08, 2008</announced>
- <revised>September 08, 2008: 01</revised>
+ <announced>2008-09-08</announced>
+ <revised>2008-09-08: 01</revised>
<bug>234080</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327">CVE-2008-2327</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327">CVE-2008-2327</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Sep 2008 17:01:52 +0000">
+ <metadata tag="requester" timestamp="2008-09-02T17:01:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Sep 2008 22:08:51 +0000">
+ <metadata tag="submitter" timestamp="2008-09-05T22:08:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Sep 2008 22:08:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-05T22:08:59Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-08.xml b/glsa-200809-08.xml
index 080a5db4..6506ef69 100644
--- a/glsa-200809-08.xml
+++ b/glsa-200809-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-08">
<title>Amarok: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>September 08, 2008</announced>
- <revised>September 08, 2008: 01</revised>
+ <announced>2008-09-08</announced>
+ <revised>2008-09-08: 01</revised>
<bug>234689</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699">CVE-2008-3699</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699">CVE-2008-3699</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Sep 2008 17:05:46 +0000">
+ <metadata tag="requester" timestamp="2008-09-02T17:05:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Sep 2008 21:54:43 +0000">
+ <metadata tag="submitter" timestamp="2008-09-05T21:54:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Sep 2008 21:54:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-05T21:54:55Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-09.xml b/glsa-200809-09.xml
index 3dc53098..84fbff72 100644
--- a/glsa-200809-09.xml
+++ b/glsa-200809-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-09">
<title>Postfix: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">postfix</product>
- <announced>September 19, 2008</announced>
- <revised>September 19, 2008: 01</revised>
+ <announced>2008-09-19</announced>
+ <revised>2008-09-19: 01</revised>
<bug>236453</bug>
<access>local</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.4.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.4.9"</code>
<p>
All Postfix 2.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889">CVE-2008-3889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889">CVE-2008-3889</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Sep 2008 20:58:07 +0000">
+ <metadata tag="requester" timestamp="2008-09-03T20:58:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Sep 2008 18:33:40 +0000">
+ <metadata tag="submitter" timestamp="2008-09-08T18:33:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Sep 2008 18:33:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-08T18:33:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-10.xml b/glsa-200809-10.xml
index 9fab704e..b5cbca64 100644
--- a/glsa-200809-10.xml
+++ b/glsa-200809-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-10">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Mantis.
</synopsis>
<product type="ebuild">mantisbt</product>
- <announced>September 21, 2008</announced>
- <revised>November 26, 2008: 02</revised>
+ <announced>2008-09-21</announced>
+ <revised>2008-11-26: 02</revised>
<bug>222649</bug>
<bug>233336</bug>
<access>remote</access>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276">CVE-2008-2276</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331">CVE-2008-3331</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332">CVE-2008-3332</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333">CVE-2008-3333</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276">CVE-2008-2276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331">CVE-2008-3331</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332">CVE-2008-3332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333">CVE-2008-3333</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 19 Sep 2008 19:55:47 +0000">
+ <metadata tag="requester" timestamp="2008-09-19T19:55:47Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 19:59:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T19:59:03Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Sep 2008 21:37:36 +0000">
+ <metadata tag="submitter" timestamp="2008-09-20T21:37:36Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-11.xml b/glsa-200809-11.xml
index dfd4bb40..f275ea57 100644
--- a/glsa-200809-11.xml
+++ b/glsa-200809-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-11">
<title>HAVP: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in HAVP.
</synopsis>
<product type="ebuild">havp</product>
- <announced>September 21, 2008</announced>
- <revised>September 21, 2008: 01</revised>
+ <announced>2008-09-21</announced>
+ <revised>2008-09-21: 01</revised>
<bug>234715</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/havp-0.89&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/havp-0.89"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3688">CVE-2008-3688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3688">CVE-2008-3688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:30:12 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:30:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:30:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:30:30Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2008 11:28:47 +0000">
+ <metadata tag="submitter" timestamp="2008-09-19T11:28:47Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-12.xml b/glsa-200809-12.xml
index 1003920b..e415d54b 100644
--- a/glsa-200809-12.xml
+++ b/glsa-200809-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-12">
<title>Newsbeuter: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary shell commands.
</synopsis>
<product type="ebuild">newsbeuter</product>
- <announced>September 22, 2008</announced>
- <revised>September 22, 2008: 01</revised>
+ <announced>2008-09-22</announced>
+ <revised>2008-09-22: 01</revised>
<bug>236506</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-news/newsbeuter-1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-news/newsbeuter-1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3907">CVE-2008-3907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3907">CVE-2008-3907</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Sep 2008 17:38:14 +0000">
+ <metadata tag="requester" timestamp="2008-09-11T17:38:14Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Sep 2008 21:45:41 +0000">
+ <metadata tag="submitter" timestamp="2008-09-18T21:45:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:45:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:45:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-13.xml b/glsa-200809-13.xml
index 04852252..945ccdae 100644
--- a/glsa-200809-13.xml
+++ b/glsa-200809-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-13">
<title>R: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">R</product>
- <announced>September 22, 2008</announced>
- <revised>September 22, 2008: 01</revised>
+ <announced>2008-09-22</announced>
+ <revised>2008-09-22: 01</revised>
<bug>235822</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/R-2.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/R-2.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3931">CVE-2008-3931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3931">CVE-2008-3931</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:52:27 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:52:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 22:01:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T22:01:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2008 11:52:28 +0000">
+ <metadata tag="submitter" timestamp="2008-09-19T11:52:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-14.xml b/glsa-200809-14.xml
index 0e1becfd..5c3e7093 100644
--- a/glsa-200809-14.xml
+++ b/glsa-200809-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-14">
<title>BitlBee: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
restrictions and hijack accounts.
</synopsis>
<product type="ebuild">bitlbee</product>
- <announced>September 23, 2008</announced>
- <revised>September 23, 2008: 01</revised>
+ <announced>2008-09-23</announced>
+ <revised>2008-09-23: 01</revised>
<bug>236160</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/bitlbee-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/bitlbee-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3920">CVE-2008-3920</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3969">CVE-2008-3969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3920">CVE-2008-3920</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3969">CVE-2008-3969</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Sep 2008 20:44:15 +0000">
+ <metadata tag="requester" timestamp="2008-09-05T20:44:15Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 20:00:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T20:00:27Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Sep 2008 21:14:39 +0000">
+ <metadata tag="submitter" timestamp="2008-09-20T21:14:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-15.xml b/glsa-200809-15.xml
index 5214bf2e..a8f07ca6 100644
--- a/glsa-200809-15.xml
+++ b/glsa-200809-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-15">
<title>GNU ed: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ed</product>
- <announced>September 23, 2008</announced>
- <revised>September 23, 2008: 01</revised>
+ <announced>2008-09-23</announced>
+ <revised>2008-09-23: 01</revised>
<bug>236521</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/ed-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/ed-1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916">CVE-2008-3916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916">CVE-2008-3916</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Sep 2008 11:31:13 +0000">
+ <metadata tag="requester" timestamp="2008-09-14T11:31:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Sep 2008 21:37:26 +0000">
+ <metadata tag="submitter" timestamp="2008-09-18T21:37:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:37:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:37:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-16.xml b/glsa-200809-16.xml
index 65a1dc0b..4dfd21d3 100644
--- a/glsa-200809-16.xml
+++ b/glsa-200809-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-16">
<title>Git: User-assisted execution of arbitrary code</title>
<synopsis>
Multiple buffer overflow vulnerabilities have been discovered in Git.
</synopsis>
<product type="ebuild">git</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>234075</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.5.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.5.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546">CVE-2008-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546">CVE-2008-3546</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:13:42 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:13:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Sep 2008 11:16:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-21T11:16:38Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Sep 2008 11:39:05 +0000">
+ <metadata tag="submitter" timestamp="2008-09-22T11:39:05Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-17.xml b/glsa-200809-17.xml
index bade36fb..3851276e 100644
--- a/glsa-200809-17.xml
+++ b/glsa-200809-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-17">
<title>Wireshark: Multiple Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>236515</bug>
<access>remote</access>
<affected>
@@ -62,21 +61,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146">CVE-2008-3146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3932">CVE-2008-3932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933">CVE-2008-3933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934">CVE-2008-3934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146">CVE-2008-3146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3932">CVE-2008-3932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933">CVE-2008-3933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934">CVE-2008-3934</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:39:05 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:39:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Sep 2008 19:29:18 +0000">
+ <metadata tag="submitter" timestamp="2008-09-24T19:29:18Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Sep 2008 19:30:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-24T19:30:10Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200809-18.xml b/glsa-200809-18.xml
index 8b28de02..8e14c429 100644
--- a/glsa-200809-18.xml
+++ b/glsa-200809-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-18">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
Multiple vulnerabilities in ClamAV may result in a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>236665</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.94&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.94"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389">CVE-2008-1389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912">CVE-2008-3912</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913">CVE-2008-3913</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914">CVE-2008-3914</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389">CVE-2008-1389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912">CVE-2008-3912</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913">CVE-2008-3913</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914">CVE-2008-3914</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:57:14 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:57:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Sep 2008 19:42:36 +0000">
+ <metadata tag="submitter" timestamp="2008-09-24T19:42:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Sep 2008 19:42:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-24T19:42:53Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200810-01.xml b/glsa-200810-01.xml
index c9fedd0b..7fff8aa7 100644
--- a/glsa-200810-01.xml
+++ b/glsa-200810-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-01">
<title>WordNet: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">wordnet</product>
- <announced>October 07, 2008</announced>
- <revised>October 07, 2008: 01</revised>
+ <announced>2008-10-07</announced>
+ <revised>2008-10-07: 01</revised>
<bug>211491</bug>
<access>local, remote</access>
<affected>
@@ -74,19 +73,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-dicts/wordnet-3.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-dicts/wordnet-3.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149">CVE-2008-2149</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908">CVE-2008-3908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149">CVE-2008-2149</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908">CVE-2008-3908</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:08:59 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:08:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Sep 2008 11:09:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-21T11:09:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Sep 2008 09:37:40 +0000">
+ <metadata tag="submitter" timestamp="2008-09-26T09:37:40Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200810-02.xml b/glsa-200810-02.xml
index 176027ca..45a6f873 100644
--- a/glsa-200810-02.xml
+++ b/glsa-200810-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-02">
<title>Portage: Untrusted search path local root vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
directories.
</synopsis>
<product type="ebuild">portage</product>
- <announced>October 09, 2008</announced>
- <revised>October 09, 2008: 01</revised>
+ <announced>2008-10-09</announced>
+ <revised>2008-10-09: 01</revised>
<bug>239560</bug>
<access>local</access>
<affected>
@@ -55,19 +54,19 @@
<code>
# cd /root
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.1.4.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.1.4.5"</code>
<p>
NOTE: To upgrade to Portage 2.1.4.5 using 2.1.4.4 or prior, you must
run emerge from a trusted working directory, such as "/root".
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4394">CVE-2008-4394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4394">CVE-2008-4394</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Oct 2008 16:50:57 +0000">
+ <metadata tag="submitter" timestamp="2008-10-08T16:50:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Oct 2008 16:58:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-08T16:58:04Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200810-03.xml b/glsa-200810-03.xml
index 15bb6ceb..c5aa40ab 100644
--- a/glsa-200810-03.xml
+++ b/glsa-200810-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-03">
<title>libspf2: DNS response buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libspf2</product>
- <announced>October 30, 2008</announced>
- <revised>October 30, 2008: 01</revised>
+ <announced>2008-10-30</announced>
+ <revised>2008-10-30: 01</revised>
<bug>242254</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/libspf2-1.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/libspf2-1.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469">CVE-2008-2469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469">CVE-2008-2469</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 16:51:58 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T16:51:58Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Oct 2008 19:27:11 +0000">
+ <metadata tag="submitter" timestamp="2008-10-19T19:27:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Oct 2008 13:43:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-23T13:43:28Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200811-01.xml b/glsa-200811-01.xml
index 5c2ae1d0..aeb07e92 100644
--- a/glsa-200811-01.xml
+++ b/glsa-200811-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-01">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>November 03, 2008</announced>
- <revised>November 03, 2008: 01</revised>
+ <announced>2008-11-03</announced>
+ <revised>2008-11-03: 01</revised>
<bug>235298</bug>
<bug>240500</bug>
<bug>243060</bug>
@@ -100,28 +99,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.62&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.62"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4195">CVE-2008-4195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4196">CVE-2008-4196</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4197">CVE-2008-4197</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4198">CVE-2008-4198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4199">CVE-2008-4199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4200">CVE-2008-4200</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4292">CVE-2008-4292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694">CVE-2008-4694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695">CVE-2008-4695</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696">CVE-2008-4696</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697">CVE-2008-4697</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698">CVE-2008-4698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794">CVE-2008-4794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795">CVE-2008-4795</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4195">CVE-2008-4195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4196">CVE-2008-4196</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4197">CVE-2008-4197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4198">CVE-2008-4198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4199">CVE-2008-4199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4200">CVE-2008-4200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4292">CVE-2008-4292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694">CVE-2008-4694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695">CVE-2008-4695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696">CVE-2008-4696</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697">CVE-2008-4697</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698">CVE-2008-4698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794">CVE-2008-4794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795">CVE-2008-4795</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 13 Oct 2008 21:25:07 +0000">
+ <metadata tag="submitter" timestamp="2008-10-13T21:25:07Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 03 Nov 2008 18:39:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-03T18:39:54Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200811-02.xml b/glsa-200811-02.xml
index 9a1ee4c2..ddf5f922 100644
--- a/glsa-200811-02.xml
+++ b/glsa-200811-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-02">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code, disclosure of local files or theft of user's credentials.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 09, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-11-09</announced>
+ <revised>2009-05-28: 02</revised>
<bug>234137</bug>
<bug>238113</bug>
<access>remote</access>
@@ -70,27 +69,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.6"</code>
<p>
All Gallery 1 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3600">CVE-2008-3600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662">CVE-2008-3662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129">CVE-2008-4129</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130">CVE-2008-4130</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3600">CVE-2008-3600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662">CVE-2008-3662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129">CVE-2008-4129</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130">CVE-2008-4130</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 20:31:05 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T20:31:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:22:34 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:22:34Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:12:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:12:12Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200811-03.xml b/glsa-200811-03.xml
index dd10f432..142080d3 100644
--- a/glsa-200811-03.xml
+++ b/glsa-200811-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-03">
<title>FAAD2: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via an MP4 file.
</synopsis>
<product type="ebuild">faad2</product>
- <announced>November 09, 2008</announced>
- <revised>November 09, 2008: 01</revised>
+ <announced>2008-11-09</announced>
+ <revised>2008-11-09: 01</revised>
<bug>238445</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/faad2-2.6.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/faad2-2.6.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201">CVE-2008-4201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201">CVE-2008-4201</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Oct 2008 21:20:46 +0000">
+ <metadata tag="requester" timestamp="2008-10-01T21:20:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:30:57 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:30:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Oct 2008 23:45:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-30T23:45:59Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200811-04.xml b/glsa-200811-04.xml
index 8e308470..1933c921 100644
--- a/glsa-200811-04.xml
+++ b/glsa-200811-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-04">
<title>Graphviz: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via a DOT file.
</synopsis>
<product type="ebuild">graphviz</product>
- <announced>November 09, 2008</announced>
- <revised>November 09, 2008: 01</revised>
+ <announced>2008-11-09</announced>
+ <revised>2008-11-09: 01</revised>
<bug>240636</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphviz-2.20.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphviz-2.20.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555">CVE-2008-4555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555">CVE-2008-4555</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Oct 2008 18:49:15 +0000">
+ <metadata tag="requester" timestamp="2008-10-16T18:49:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:26:38 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:26:38Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:00:32Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200811-05.xml b/glsa-200811-05.xml
index 3da6532a..abedea57 100644
--- a/glsa-200811-05.xml
+++ b/glsa-200811-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-05">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 16, 2008</announced>
- <revised>November 16, 2008: 01</revised>
+ <announced>2008-11-16</announced>
+ <revised>2008-11-16: 01</revised>
<bug>209148</bug>
<bug>212211</bug>
<bug>215266</bug>
@@ -102,31 +101,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.6-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599">CVE-2008-0599</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384">CVE-2008-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050">CVE-2008-2050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051">CVE-2008-2051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107">CVE-2008-2107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2108">CVE-2008-2108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2665">CVE-2008-2665</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2666">CVE-2008-2666</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829">CVE-2008-2829</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658">CVE-2008-3658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659">CVE-2008-3659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660">CVE-2008-3660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599">CVE-2008-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384">CVE-2008-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050">CVE-2008-2050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051">CVE-2008-2051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107">CVE-2008-2107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2108">CVE-2008-2108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2665">CVE-2008-2665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2666">CVE-2008-2666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829">CVE-2008-2829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658">CVE-2008-3658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659">CVE-2008-3659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660">CVE-2008-3660</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Mar 2008 01:12:26 +0000">
+ <metadata tag="requester" timestamp="2008-03-17T01:12:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Nov 2008 18:29:08 +0000">
+ <metadata tag="submitter" timestamp="2008-11-10T18:29:08Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 16 Nov 2008 16:06:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-16T16:06:26Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200812-01.xml b/glsa-200812-01.xml
index 93b74573..502cd0e0 100644
--- a/glsa-200812-01.xml
+++ b/glsa-200812-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-01">
<title>OptiPNG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>246522</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/optipng-0.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/optipng-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101">CVE-2008-5101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101">CVE-2008-5101</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Nov 2008 17:38:05 +0000">
+ <metadata tag="requester" timestamp="2008-11-22T17:38:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:15:20 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:15:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:15:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:15:33Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-02.xml b/glsa-200812-02.xml
index eec9a31e..e833310e 100644
--- a/glsa-200812-02.xml
+++ b/glsa-200812-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-02">
<title>enscript: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">enscript</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 02</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 02</revised>
<bug>243228</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/enscript-1.6.4-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/enscript-1.6.4-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863">CVE-2008-3863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306">CVE-2008-4306</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863">CVE-2008-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306">CVE-2008-4306</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Nov 2008 17:28:05 +0000">
+ <metadata tag="requester" timestamp="2008-11-27T17:28:05Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2008 17:37:26 +0000">
+ <metadata tag="submitter" timestamp="2008-11-27T17:37:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 17:37:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T17:37:33Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-03.xml b/glsa-200812-03.xml
index 0898f64b..6486575c 100644
--- a/glsa-200812-03.xml
+++ b/glsa-200812-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-03">
<title>IPsec-Tools: racoon Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>232831</bug>
<access>remote</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">CVE-2008-3651</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">CVE-2008-3652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">CVE-2008-3651</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">CVE-2008-3652</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:44:35 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:44:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:25:15 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:25:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:25:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:25:48Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-04.xml b/glsa-200812-04.xml
index 1faca26e..1d1e0185 100644
--- a/glsa-200812-04.xml
+++ b/glsa-200812-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-04">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>238180</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298">CVE-2008-4298</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359">CVE-2008-4359</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360">CVE-2008-4360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298">CVE-2008-4298</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359">CVE-2008-4359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360">CVE-2008-4360</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:41:57 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:41:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 22:38:27 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T22:38:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 22:39:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T22:39:43Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-05.xml b/glsa-200812-05.xml
index 389a444a..32dbe98c 100644
--- a/glsa-200812-05.xml
+++ b/glsa-200812-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-05">
<title>libsamplerate: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libsamplerate</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>237037</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsamplerate-0.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsamplerate-0.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5008">CVE-2008-5008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5008">CVE-2008-5008</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Nov 2008 13:51:38 +0000">
+ <metadata tag="requester" timestamp="2008-11-07T13:51:38Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2008 16:25:38 +0000">
+ <metadata tag="submitter" timestamp="2008-11-27T16:25:38Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 16:25:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T16:25:44Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-06.xml b/glsa-200812-06.xml
index 07980f14..da036f1d 100644
--- a/glsa-200812-06.xml
+++ b/glsa-200812-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-06">
<title>libxml2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>234099</bug>
<bug>237806</bug>
<bug>239346</bug>
@@ -76,22 +75,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.7.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.7.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281">CVE-2008-3281</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529">CVE-2008-3529</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409">CVE-2008-4409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225">CVE-2008-4225</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226">CVE-2008-4226</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281">CVE-2008-3281</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529">CVE-2008-3529</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409">CVE-2008-4409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225">CVE-2008-4225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226">CVE-2008-4226</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Oct 2008 21:27:07 +0000">
+ <metadata tag="requester" timestamp="2008-10-01T21:27:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 31 Oct 2008 00:21:31 +0000">
+ <metadata tag="submitter" timestamp="2008-10-31T00:21:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:21:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:21:45Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-07.xml b/glsa-200812-07.xml
index 4025d79c..1282ce62 100644
--- a/glsa-200812-07.xml
+++ b/glsa-200812-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-07">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which leading to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mantisbt</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>238570</bug>
<bug>241940</bug>
<bug>242722</bug>
@@ -66,21 +65,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.1.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3102">CVE-2008-3102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4687">CVE-2008-4687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4688">CVE-2008-4688</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4689">CVE-2008-4689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3102">CVE-2008-3102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4687">CVE-2008-4687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4688">CVE-2008-4688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4689">CVE-2008-4689</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Oct 2008 21:35:00 +0000">
+ <metadata tag="requester" timestamp="2008-10-31T21:35:00Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 19:39:16 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T19:39:16Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 19:39:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T19:39:31Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-08.xml b/glsa-200812-08.xml
index 6c1bdf2e..e6b9ab1f 100644
--- a/glsa-200812-08.xml
+++ b/glsa-200812-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-08">
<title>Mgetty: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">mgetty</product>
- <announced>December 06, 2008</announced>
- <revised>December 23, 2008: 02</revised>
+ <announced>2008-12-06</announced>
+ <revised>2008-12-23: 02</revised>
<bug>235806</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/mgetty-1.1.36-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/mgetty-1.1.36-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936">CVE-2008-4936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936">CVE-2008-4936</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:40:45 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:40:45Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Sep 2008 11:36:13 +0000">
+ <metadata tag="submitter" timestamp="2008-09-23T11:36:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Sep 2008 11:36:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-23T11:36:50Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-09.xml b/glsa-200812-09.xml
index ed0391ba..6ea7506f 100644
--- a/glsa-200812-09.xml
+++ b/glsa-200812-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-09">
<title>OpenSC: Insufficient protection of smart card PIN</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing attackers to reset it.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>233543</bug>
<access>local</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/opensc-0.11.6&quot;
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/opensc-0.11.6"
# pkcs15-tool --test-update
# pkcs15-tool --test-update --update</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235">CVE-2008-2235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235">CVE-2008-2235</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:58:19 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:58:19Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 19:57:21 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T19:57:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 19:57:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T19:57:53Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-10.xml b/glsa-200812-10.xml
index 774d0ba8..53b06ebe 100644
--- a/glsa-200812-10.xml
+++ b/glsa-200812-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-10">
<title>Archive::Tar: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in Archive::Tar.
</synopsis>
<product type="ebuild">Archive-Tar</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>192989</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Archive-Tar-1.40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Archive-Tar-1.40"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4829">CVE-2007-4829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4829">CVE-2007-4829</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:55:42 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:55:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:31:02 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:31:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:31:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:31:20Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-11.xml b/glsa-200812-11.xml
index 4f6db6bb..e9921b02 100644
--- a/glsa-200812-11.xml
+++ b/glsa-200812-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-11">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cups</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>238976</bug>
<bug>249727</bug>
<access>remote</access>
@@ -64,18 +63,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.3.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639">CVE-2008-3639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640">CVE-2008-3640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641">CVE-2008-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286">CVE-2008-5286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639">CVE-2008-3639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640">CVE-2008-3640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641">CVE-2008-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286">CVE-2008-5286</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:13:17 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T10:13:17Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:09:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-06T18:09:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-12.xml b/glsa-200812-12.xml
index 33dd1b7d..74bc8ece 100644
--- a/glsa-200812-12.xml
+++ b/glsa-200812-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-12">
<title>Honeyd: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to symlink attacks.
</synopsis>
<product type="ebuild">honeyd</product>
- <announced>December 12, 2008</announced>
- <revised>December 12, 2008: 01</revised>
+ <announced>2008-12-12</announced>
+ <revised>2008-12-12: 01</revised>
<bug>237481</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/honeyd-1.5c-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/honeyd-1.5c-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3928">CVE-2008-3928</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3928">CVE-2008-3928</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 20:32:05 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T20:32:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:17:52 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:17:52Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:14:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:14:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-13.xml b/glsa-200812-13.xml
index 314bee38..998f56c0 100644
--- a/glsa-200812-13.xml
+++ b/glsa-200812-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-13">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or symlink attacks.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>December 12, 2008</announced>
- <revised>December 12, 2008: 01</revised>
+ <announced>2008-12-12</announced>
+ <revised>2008-12-12: 01</revised>
<bug>235824</bug>
<bug>244995</bug>
<access>local, remote</access>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-3.0.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237">CVE-2008-2237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238">CVE-2008-2238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4937">CVE-2008-4937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237">CVE-2008-2237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238">CVE-2008-2238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4937">CVE-2008-4937</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Nov 2008 09:50:25 +0000">
+ <metadata tag="requester" timestamp="2008-11-08T09:50:25Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Nov 2008 09:56:21 +0000">
+ <metadata tag="submitter" timestamp="2008-11-08T09:56:21Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 19:46:56 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T19:46:56Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-14.xml b/glsa-200812-14.xml
index 69058ef8..00fcaecc 100644
--- a/glsa-200812-14.xml
+++ b/glsa-200812-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-14">
<title>aview: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">aview</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>235808</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/aview-1.3.0_rc1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/aview-1.3.0_rc1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4935">CVE-2008-4935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4935">CVE-2008-4935</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:39:57 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:39:57Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:48:01 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:48:01Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:00:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:00:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-15.xml b/glsa-200812-15.xml
index ff007ad1..b334eaa5 100644
--- a/glsa-200812-15.xml
+++ b/glsa-200812-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-15">
<title>POV-Ray: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when reading a specially crafted PNG file
</synopsis>
<product type="ebuild">povray</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>153538</bug>
<access>local</access>
<affected>
@@ -29,7 +28,7 @@
files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964,
CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in
POV-Ray's build system caused it to load the old version when your
- installed copy of libpng was >=media-libs/libpng-1.2.10.
+ installed copy of libpng was &gt;=media-libs/libpng-1.2.10.
</p>
</description>
<impact type="normal">
@@ -50,22 +49,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/povray-3.6.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/povray-3.6.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0768">CVE-2004-0768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0481">CVE-2006-0481</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964">CVE-2008-3964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0768">CVE-2004-0768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0481">CVE-2006-0481</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964">CVE-2008-3964</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Dec 2008 23:06:51 +0000">
+ <metadata tag="requester" timestamp="2008-12-04T23:06:51Z">
mabi
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Dec 2008 15:52:40 +0000">
+ <metadata tag="submitter" timestamp="2008-12-06T15:52:40Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:06:51 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:06:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-16.xml b/glsa-200812-16.xml
index 9d34a4cc..b3507310 100644
--- a/glsa-200812-16.xml
+++ b/glsa-200812-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-16">
<title>Dovecot: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in the Dovecot mailserver.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>240409</bug>
<bug>244962</bug>
<bug>245316</bug>
@@ -58,7 +57,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.1.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.1.7-r1"</code>
<p>
Users should be aware that dovecot.conf will still be world-readable
after the update. If employing ssl_key_password, it should not be used
@@ -67,15 +66,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577">CVE-2008-4577</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4578">CVE-2008-4578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4870">CVE-2008-4870</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4907">CVE-2008-4907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577">CVE-2008-4577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4578">CVE-2008-4578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4870">CVE-2008-4870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4907">CVE-2008-4907</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:07:16 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T10:07:16Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:05:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-06T18:05:53Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-17.xml b/glsa-200812-17.xml
index 9e0f1160..38e3b554 100644
--- a/glsa-200812-17.xml
+++ b/glsa-200812-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-17">
<title>Ruby: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks including arbitrary code execution and Denial of Service.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>December 16, 2008</announced>
- <revised>December 16, 2008: 01</revised>
+ <announced>2008-12-16</announced>
+ <revised>2008-12-16: 01</revised>
<bug>225465</bug>
<bug>236060</bug>
<access>remote</access>
@@ -92,29 +91,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p287-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p287-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376">CVE-2008-2376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662">CVE-2008-2662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663">CVE-2008-2663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664">CVE-2008-2664</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725">CVE-2008-2725</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726">CVE-2008-2726</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655">CVE-2008-3655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656">CVE-2008-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657">CVE-2008-3657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790">CVE-2008-3790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905">CVE-2008-3905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376">CVE-2008-2376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662">CVE-2008-2662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663">CVE-2008-2663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664">CVE-2008-2664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725">CVE-2008-2725</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726">CVE-2008-2726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655">CVE-2008-3655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656">CVE-2008-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657">CVE-2008-3657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790">CVE-2008-3790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905">CVE-2008-3905</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:43:41 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:43:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Nov 2008 18:52:14 +0000">
+ <metadata tag="submitter" timestamp="2008-11-10T18:52:14Z">
hoffie
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 16:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T16:38:46Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200812-18.xml b/glsa-200812-18.xml
index f9546b25..bbf60626 100644
--- a/glsa-200812-18.xml
+++ b/glsa-200812-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-18">
<title>JasPer: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via jpeg2k files.
</synopsis>
<product type="ebuild">jasper</product>
- <announced>December 16, 2008</announced>
- <revised>December 16, 2008: 01</revised>
+ <announced>2008-12-16</announced>
+ <revised>2008-12-16: 01</revised>
<bug>222819</bug>
<access>remote</access>
<affected>
@@ -60,19 +59,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/jasper-1.900.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/jasper-1.900.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520">CVE-2008-3520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522">CVE-2008-3522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520">CVE-2008-3520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522">CVE-2008-3522</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Oct 2008 18:51:07 +0000">
+ <metadata tag="requester" timestamp="2008-10-13T18:51:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:38:03 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:38:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Dec 2008 14:20:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-15T14:20:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-19.xml b/glsa-200812-19.xml
index 0ce0878b..9de6558c 100644
--- a/glsa-200812-19.xml
+++ b/glsa-200812-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-19">
<title>PowerDNS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and easing cache poisoning attacks.
</synopsis>
<product type="ebuild">pdns</product>
- <announced>December 19, 2008</announced>
- <revised>December 19, 2008: 01</revised>
+ <announced>2008-12-19</announced>
+ <revised>2008-12-19: 01</revised>
<bug>234032</bug>
<bug>247079</bug>
<access>remote</access>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-2.9.21.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-2.9.21.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337">CVE-2008-3337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277">CVE-2008-5277</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337">CVE-2008-3337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277">CVE-2008-5277</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Sep 2008 21:05:59 +0000">
+ <metadata tag="requester" timestamp="2008-09-06T21:05:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Sep 2008 21:06:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-06T21:06:12Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Sep 2008 17:38:51 +0000">
+ <metadata tag="submitter" timestamp="2008-09-10T17:38:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-200812-20.xml b/glsa-200812-20.xml
index 0ab9eb1d..793de9f8 100644
--- a/glsa-200812-20.xml
+++ b/glsa-200812-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-20">
<title>phpCollab: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote injection of shell commands, PHP code and SQL statements.
</synopsis>
<product type="ebuild">phpcollab</product>
- <announced>December 21, 2008</announced>
- <revised>December 21, 2008: 01</revised>
+ <announced>2008-12-21</announced>
+ <revised>2008-12-21: 01</revised>
<bug>235052</bug>
<access>remote</access>
<affected>
@@ -66,21 +65,21 @@
users unmerge phpCollab:
</p>
<code>
- # emerge --unmerge &quot;www-apps/phpcollab&quot;</code>
+ # emerge --unmerge "www-apps/phpcollab"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1495">CVE-2006-1495</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4303">CVE-2008-4303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4304">CVE-2008-4304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4305">CVE-2008-4305</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1495">CVE-2006-1495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4303">CVE-2008-4303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4304">CVE-2008-4304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4305">CVE-2008-4305</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Oct 2008 20:05:40 +0000">
+ <metadata tag="requester" timestamp="2008-10-19T20:05:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Dec 2008 13:16:45 +0000">
+ <metadata tag="submitter" timestamp="2008-12-07T13:16:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Dec 2008 16:51:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-10T16:51:12Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200812-21.xml b/glsa-200812-21.xml
index f0be87f7..fdaa600f 100644
--- a/glsa-200812-21.xml
+++ b/glsa-200812-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-21">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>245450</bug>
<bug>249833</bug>
<access>remote</access>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.94.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.94.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050">CVE-2008-5050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314">CVE-2008-5314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050">CVE-2008-5050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314">CVE-2008-5314</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2008 22:40:43 +0000">
+ <metadata tag="requester" timestamp="2008-12-09T22:40:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 18:51:07 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T18:51:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 18:56:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T18:56:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-22.xml b/glsa-200812-22.xml
index f6e7dfbb..1a94a561 100644
--- a/glsa-200812-22.xml
+++ b/glsa-200812-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-22">
<title>Ampache: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">ampache</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>237483</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/ampache-3.4.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/ampache-3.4.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3929">CVE-2008-3929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3929">CVE-2008-3929</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:37:47 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:37:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2008 21:03:24 +0000">
+ <metadata tag="submitter" timestamp="2008-12-11T21:03:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 21:03:37 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T21:03:37Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-23.xml b/glsa-200812-23.xml
index 0c2e4be9..f2eade38 100644
--- a/glsa-200812-23.xml
+++ b/glsa-200812-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-23">
<title>Imlib2: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Imlib2.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>248057</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.4.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187">CVE-2008-5187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187">CVE-2008-5187</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2008 11:53:50 +0000">
+ <metadata tag="requester" timestamp="2008-12-07T11:53:50Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2008 12:38:00 +0000">
+ <metadata tag="submitter" timestamp="2008-12-11T12:38:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 12:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T12:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200812-24.xml b/glsa-200812-24.xml
index 4e7c18dd..31986a33 100644
--- a/glsa-200812-24.xml
+++ b/glsa-200812-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-24">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>December 24, 2008</announced>
- <revised>December 24, 2008: 01</revised>
+ <announced>2008-12-24</announced>
+ <revised>2008-12-24: 01</revised>
<bug>245774</bug>
<bug>249391</bug>
<access>remote</access>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.9.8a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.9.8a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032">CVE-2008-5032</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036">CVE-2008-5036</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276">CVE-2008-5276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032">CVE-2008-5032</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036">CVE-2008-5036</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276">CVE-2008-5276</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Dec 2008 14:05:23 +0000">
+ <metadata tag="requester" timestamp="2008-12-15T14:05:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 19:55:55 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T19:55:55Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 20:12:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T20:12:40Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-01.xml b/glsa-200901-01.xml
index 2486be14..c79192d4 100644
--- a/glsa-200901-01.xml
+++ b/glsa-200901-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-01">
<title>NDISwrapper: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
with root privileges.
</synopsis>
<product type="ebuild">ndiswrapper</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>239371</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/ndiswrapper-1.53-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/ndiswrapper-1.53-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395">CVE-2008-4395</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395">CVE-2008-4395</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Nov 2008 16:33:13 +0000">
+ <metadata tag="requester" timestamp="2008-11-06T16:33:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:45:28 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:45:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:45:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:45:36Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-02.xml b/glsa-200901-02.xml
index afa96cfb..c08125e8 100644
--- a/glsa-200901-02.xml
+++ b/glsa-200901-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-02">
<title>JHead: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or data loss.
</synopsis>
<product type="ebuild">jhead</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>242702</bug>
<bug>243238</bug>
<access>remote</access>
@@ -63,21 +62,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/jhead-2.84-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/jhead-2.84-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575">CVE-2008-4575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639">CVE-2008-4639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640">CVE-2008-4640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641">CVE-2008-4641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575">CVE-2008-4575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639">CVE-2008-4639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640">CVE-2008-4640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641">CVE-2008-4641</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:47:59 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:47:59Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 21:08:46 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T21:08:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Dec 2008 17:01:39 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-10T17:01:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-03.xml b/glsa-200901-03.xml
index f24b1c6c..deadb502 100644
--- a/glsa-200901-03.xml
+++ b/glsa-200901-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-03">
<title>pdnsd: Denial of Service and cache poisoning</title>
<synopsis>
Two errors in pdnsd allow for Denial of Service and cache poisoning.
</synopsis>
<product type="ebuild">pdnsd</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>231285</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdnsd-1.2.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdnsd-1.2.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194">CVE-2008-4194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194">CVE-2008-4194</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:15:10 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:15:10Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:10:06 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:10:06Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:10:19 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:10:19Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-04.xml b/glsa-200901-04.xml
index 1cc9f28d..c8d47371 100644
--- a/glsa-200901-04.xml
+++ b/glsa-200901-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-04">
<title>D-Bus: Denial of Service</title>
<synopsis>
An error condition can cause D-Bus to crash.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>240308</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/dbus-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/dbus-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834">CVE-2008-3834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834">CVE-2008-3834</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:43:42 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:43:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 21:51:45 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T21:51:45Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 21:52:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T21:52:15Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-05.xml b/glsa-200901-05.xml
index c9e0e6ef..b3a1d2c0 100644
--- a/glsa-200901-05.xml
+++ b/glsa-200901-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-05">
<title>Streamripper: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>249039</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.64.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.64.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829">CVE-2008-4829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829">CVE-2008-4829</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2008 20:23:24 +0000">
+ <metadata tag="requester" timestamp="2008-12-07T20:23:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 20:28:31 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T20:28:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 20:29:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T20:29:17Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-06.xml b/glsa-200901-06.xml
index bb0d63f9..b5714967 100644
--- a/glsa-200901-06.xml
+++ b/glsa-200901-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-06">
<title>Tremulous: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Tremulous.
</synopsis>
<product type="ebuild">tremulous tremulous-bin</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>222119</bug>
<access>remote</access>
<affected>
@@ -49,23 +48,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/tremulous-1.1.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/tremulous-1.1.0-r2"</code>
<p>
Note: The binary version of Tremulous has been removed from the Portage
tree.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
- <uri link="/security/en/glsa/glsa-200605-12.xml">GLSA 200605-12</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200605-12.xml">GLSA 200605-12</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Oct 2008 16:40:23 +0000">
+ <metadata tag="requester" timestamp="2008-10-13T16:40:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 22:54:22 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T22:54:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 22:54:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T22:54:33Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-07.xml b/glsa-200901-07.xml
index 9f410d37..afb97339 100644
--- a/glsa-200901-07.xml
+++ b/glsa-200901-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-07">
<title>MPlayer: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>January 12, 2009</announced>
- <revised>January 12, 2009: 01</revised>
+ <announced>2009-01-12</announced>
+ <revised>2009-01-12: 01</revised>
<bug>231836</bug>
<bug>239130</bug>
<bug>251017</bug>
@@ -64,20 +63,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p28058-r1 &quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p28058-r1 "</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162">CVE-2008-3162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827">CVE-2008-3827</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616">CVE-2008-5616</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162">CVE-2008-3162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827">CVE-2008-3827</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616">CVE-2008-5616</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Nov 2008 14:10:43 +0000">
+ <metadata tag="requester" timestamp="2008-11-29T14:10:43Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Jan 2009 12:40:15 +0000">
+ <metadata tag="submitter" timestamp="2009-01-11T12:40:15Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jan 2009 14:37:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-11T14:37:53Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-08.xml b/glsa-200901-08.xml
index acd2e8ad..ce30e1e3 100644
--- a/glsa-200901-08.xml
+++ b/glsa-200901-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-08">
<title>Online-Bookmarks: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Online-Bookmarks.
</synopsis>
<product type="ebuild">online-bookmarks</product>
- <announced>January 12, 2009</announced>
- <revised>January 12, 2009: 01</revised>
+ <announced>2009-01-12</announced>
+ <revised>2009-01-12: 01</revised>
<bug>235053</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/online-bookmarks-0.6.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/online-bookmarks-0.6.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2155">CVE-2004-2155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6358">CVE-2006-6358</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6359">CVE-2006-6359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2155">CVE-2004-2155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6358">CVE-2006-6358</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6359">CVE-2006-6359</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:41:34 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:41:34Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 23:26:51 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T23:26:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 23:27:06 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T23:27:06Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-09.xml b/glsa-200901-09.xml
index b5281621..f57b16a1 100644
--- a/glsa-200901-09.xml
+++ b/glsa-200901-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-09">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 13, 2009</announced>
- <revised>January 13, 2009: 01</revised>
+ <announced>2009-01-13</announced>
+ <revised>2009-01-13: 01</revised>
<bug>225483</bug>
<access>remote</access>
<affected>
@@ -81,24 +80,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549">CVE-2008-2549</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992">CVE-2008-2992</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812">CVE-2008-4812</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813">CVE-2008-4813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814">CVE-2008-4814</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815">CVE-2008-4815</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817">CVE-2008-4817</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549">CVE-2008-2549</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992">CVE-2008-2992</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812">CVE-2008-4812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813">CVE-2008-4813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814">CVE-2008-4814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815">CVE-2008-4815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817">CVE-2008-4817</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:53:29 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:53:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:51:39 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:51:39Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:51:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:51:48Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-10.xml b/glsa-200901-10.xml
index 8b0d5196..817a8bad 100644
--- a/glsa-200901-10.xml
+++ b/glsa-200901-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-10">
<title>GnuTLS: Certificate validation error</title>
<synopsis>
A certificate validation error in GnuTLS might allow for spoofing attacks.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>January 14, 2009</announced>
- <revised>January 14, 2009: 01</revised>
+ <announced>2009-01-14</announced>
+ <revised>2009-01-14: 01</revised>
<bug>245850</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.4.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.4.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989">CVE-2008-4989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989">CVE-2008-4989</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 19:06:26 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T19:06:26Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 23:37:58 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T23:37:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 23:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T23:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-11.xml b/glsa-200901-11.xml
index 0394dd30..fb7e87ca 100644
--- a/glsa-200901-11.xml
+++ b/glsa-200901-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-11">
<title>Avahi: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in Avahi.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>January 14, 2009</announced>
- <revised>January 14, 2009: 01</revised>
+ <announced>2009-01-14</announced>
+ <revised>2009-01-14: 01</revised>
<bug>250913</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081">CVE-2008-5081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081">CVE-2008-5081</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:41:03 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:41:03Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jan 2009 22:42:38 +0000">
+ <metadata tag="submitter" timestamp="2009-01-12T22:42:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jan 2009 22:42:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-12T22:42:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-12.xml b/glsa-200901-12.xml
index 3b1dff34..4b15fe25 100644
--- a/glsa-200901-12.xml
+++ b/glsa-200901-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-12">
<title>noip-updater: Execution of arbitrary code</title>
<synopsis>
A buffer overflow in noip-updater can lead to arbitrary code execution.
</synopsis>
<product type="ebuild">noip-updater</product>
- <announced>January 18, 2009</announced>
- <revised>January 18, 2009: 01</revised>
+ <announced>2009-01-18</announced>
+ <revised>2009-01-18: 01</revised>
<bug>248709</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/noip-updater-2.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/noip-updater-2.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5297">CVE-2008-5297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5297">CVE-2008-5297</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2008 20:15:03 +0000">
+ <metadata tag="requester" timestamp="2008-12-29T20:15:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Jan 2009 11:49:22 +0000">
+ <metadata tag="submitter" timestamp="2009-01-02T11:49:22Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jan 2009 18:28:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-11T18:28:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-13.xml b/glsa-200901-13.xml
index d26b5d91..bf0ef9b2 100644
--- a/glsa-200901-13.xml
+++ b/glsa-200901-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-13">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote arbitrary code execution, Denial of Service and service spoofing.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>January 20, 2009</announced>
- <revised>January 20, 2009: 01</revised>
+ <announced>2009-01-20</announced>
+ <revised>2009-01-20: 01</revised>
<bug>230045</bug>
<bug>234135</bug>
<access>remote</access>
@@ -73,21 +72,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927">CVE-2008-2927</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955">CVE-2008-2955</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957">CVE-2008-2957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532">CVE-2008-3532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927">CVE-2008-2927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955">CVE-2008-2955</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957">CVE-2008-2957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532">CVE-2008-3532</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:20:14 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:20:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 14:01:14 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T14:01:14Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Dec 2008 14:32:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-02T14:32:53Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200901-14.xml b/glsa-200901-14.xml
index 34357cb3..2cfd70da 100644
--- a/glsa-200901-14.xml
+++ b/glsa-200901-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-14">
<title>Scilab: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">scilab</product>
- <announced>January 21, 2009</announced>
- <revised>January 21, 2009: 01</revised>
+ <announced>2009-01-21</announced>
+ <revised>2009-01-21: 01</revised>
<bug>245922</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-mathematics/scilab-4.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-mathematics/scilab-4.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4983">CVE-2008-4983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4983">CVE-2008-4983</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:29:36 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:29:36Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 18:21:32 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T18:21:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 18:21:45 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T18:21:45Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200901-15.xml b/glsa-200901-15.xml
index f2ecdd79..cea49961 100644
--- a/glsa-200901-15.xml
+++ b/glsa-200901-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-15">
<title>Net-SNMP: Denial of Service</title>
<synopsis>
A vulnerability in Net-SNMP could lead to a Denial of Service.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>January 21, 2009</announced>
- <revised>January 21, 2009: 01</revised>
+ <announced>2009-01-21</announced>
+ <revised>2009-01-21: 01</revised>
<bug>245306</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309">CVE-2008-4309</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309">CVE-2008-4309</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:57:13 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:57:13Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jan 2009 22:12:01 +0000">
+ <metadata tag="submitter" timestamp="2009-01-12T22:12:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jan 2009 22:12:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-12T22:12:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200902-01.xml b/glsa-200902-01.xml
index 2e9717f7..865cf92d 100644
--- a/glsa-200902-01.xml
+++ b/glsa-200902-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-01">
<title>sudo: Privilege escalation</title>
<synopsis>
A vulnerability in sudo may allow for privilege escalation.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>February 06, 2009</announced>
- <revised>February 06, 2009: 01</revised>
+ <announced>2009-02-06</announced>
+ <revised>2009-02-06: 01</revised>
<bug>256633</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034">CVE-2009-0034</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034">CVE-2009-0034</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Feb 2009 22:59:48 +0000">
+ <metadata tag="requester" timestamp="2009-02-02T22:59:48Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Feb 2009 23:20:12 +0000">
+ <metadata tag="submitter" timestamp="2009-02-02T23:20:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Feb 2009 22:19:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-06T22:19:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200902-02.xml b/glsa-200902-02.xml
index bd2017b0..75c83e5c 100644
--- a/glsa-200902-02.xml
+++ b/glsa-200902-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-02">
<title>OpenSSL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>251346</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8j&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8j"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:07:15 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:07:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 17:07:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T17:07:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:14:56 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:14:56Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200902-03.xml b/glsa-200902-03.xml
index c13df9a5..ad021c25 100644
--- a/glsa-200902-03.xml
+++ b/glsa-200902-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-03">
<title>Valgrind: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">valgrind</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>245317</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/valgrind-3.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/valgrind-3.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865">CVE-2008-4865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865">CVE-2008-4865</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:33:22 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:33:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:46:15 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:46:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 17:47:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T17:47:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200902-04.xml b/glsa-200902-04.xml
index a3c4e01b..0e6b5276 100644
--- a/glsa-200902-04.xml
+++ b/glsa-200902-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-04">
<title>xterm: User-assisted arbitrary commands execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands execution.
</synopsis>
<product type="ebuild">xterm</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>253155</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/xterm-239&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/xterm-239"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383">CVE-2008-2383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383">CVE-2008-2383</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Jan 2009 00:33:40 +0000">
+ <metadata tag="requester" timestamp="2009-01-28T00:33:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Feb 2009 10:22:45 +0000">
+ <metadata tag="submitter" timestamp="2009-02-10T10:22:45Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 Feb 2009 10:22:57 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-10T10:22:57Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200902-05.xml b/glsa-200902-05.xml
index 21a36208..7ab94afc 100644
--- a/glsa-200902-05.xml
+++ b/glsa-200902-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-05">
<title>KTorrent: Multiple vulnerabilitites</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of code and arbitrary torrent uploads.
</synopsis>
<product type="ebuild">ktorrent</product>
- <announced>February 23, 2009</announced>
- <revised>February 23, 2009: 01</revised>
+ <announced>2009-02-23</announced>
+ <revised>2009-02-23: 01</revised>
<bug>244741</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/ktorrent-2.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5905">CVE-2008-5905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5906">CVE-2008-5906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5905">CVE-2008-5905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5906">CVE-2008-5906</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Jan 2009 20:05:03 +0000">
+ <metadata tag="requester" timestamp="2009-01-06T20:05:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 00:24:20 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T00:24:20Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 19:16:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T19:16:54Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200902-06.xml b/glsa-200902-06.xml
index cf9b4807..90c11e52 100644
--- a/glsa-200902-06.xml
+++ b/glsa-200902-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-06">
<title>GNU Emacs, XEmacs: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
XEmacs.
</synopsis>
<product type="ebuild">emacs edit-utils</product>
- <announced>February 23, 2009</announced>
- <revised>February 23, 2009: 01</revised>
+ <announced>2009-02-23</announced>
+ <revised>2009-02-23: 01</revised>
<bug>221197</bug>
<bug>236498</bug>
<access>remote</access>
@@ -67,25 +66,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-22.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-22.2-r3"</code>
<p>
All edit-utils users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-xemacs/edit-utils-2.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-xemacs/edit-utils-2.39"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142">CVE-2008-2142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3949">CVE-2008-3949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142">CVE-2008-2142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3949">CVE-2008-3949</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 22:12:00 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T22:12:00Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Jul 2008 19:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-12T19:44:28Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Feb 2009 22:47:35 +0000">
+ <metadata tag="submitter" timestamp="2009-02-09T22:47:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-01.xml b/glsa-200903-01.xml
index 60d50751..7c373050 100644
--- a/glsa-200903-01.xml
+++ b/glsa-200903-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-01">
<title>Vinagre: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vinagre</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>250314</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/vinagre-0.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/vinagre-0.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5660">CVE-2008-5660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5660">CVE-2008-5660</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Dec 2008 19:36:32 +0000">
+ <metadata tag="requester" timestamp="2008-12-13T19:36:32Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Feb 2009 22:12:27 +0000">
+ <metadata tag="submitter" timestamp="2009-02-24T22:12:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Feb 2009 22:12:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-24T22:12:38Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-02.xml b/glsa-200903-02.xml
index 0cc2f80f..46b2bcdc 100644
--- a/glsa-200903-02.xml
+++ b/glsa-200903-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-02">
<title>ZNC: Privilege escalation</title>
<synopsis>
A vulnerability in ZNC allows for privilege escalation.
</synopsis>
<product type="ebuild">znc</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>260148</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/znc-0.066&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/znc-0.066"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0759">CVE-2009-0759</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0759">CVE-2009-0759</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:11:58 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:11:58Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 22:51:15 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T22:51:15Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:00:32Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-03.xml b/glsa-200903-03.xml
index 5ceda06d..3f71f8bc 100644
--- a/glsa-200903-03.xml
+++ b/glsa-200903-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-03">
<title>Audacity: User-assisted execution of arbitrary code</title>
<synopsis>
A boundary error in Audacity allows for the execution of arbitrary code.
</synopsis>
<product type="ebuild">audacity</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>253493</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacity-1.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacity-1.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490">CVE-2009-0490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490">CVE-2009-0490</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:19:24 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:19:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:00:03 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:00:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:00:48 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:00:48Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-04.xml b/glsa-200903-04.xml
index 8e7c6f97..089b0997 100644
--- a/glsa-200903-04.xml
+++ b/glsa-200903-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-04">
<title>DevIL: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">devil</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>255217</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/devil-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/devil-1.7.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5262">CVE-2008-5262</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5262">CVE-2008-5262</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:17:56 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:17:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:09:26 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:09:26Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:07:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:07:22Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-05.xml b/glsa-200903-05.xml
index b0725cb0..059102af 100644
--- a/glsa-200903-05.xml
+++ b/glsa-200903-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-05">
<title>PDFjam: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">pdfjam</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>252734</bug>
<access>local</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdfjam-1.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdfjam-1.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5843">CVE-2008-5843</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5743">CVE-2008-5743</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5843">CVE-2008-5843</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5743">CVE-2008-5743</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Jan 2009 21:30:23 +0000">
+ <metadata tag="requester" timestamp="2009-01-23T21:30:23Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:57:17 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:57:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:57:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:57:35Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-06.xml b/glsa-200903-06.xml
index f485b6d2..d98d4299 100644
--- a/glsa-200903-06.xml
+++ b/glsa-200903-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-06">
<title>nfs-utils: Access restriction bypass</title>
<synopsis>
An error in nfs-utils allows for bypass of the netgroups restriction.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>242696</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/nfs-utils-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/nfs-utils-1.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552">CVE-2008-4552</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552">CVE-2008-4552</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:56:17 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:56:17Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:22:47 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:22:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:23:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:23:17Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-07.xml b/glsa-200903-07.xml
index 3f9fd779..53f66198 100644
--- a/glsa-200903-07.xml
+++ b/glsa-200903-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-07">
<title>Samba: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
contents.
</synopsis>
<product type="ebuild">samba</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>247620</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.33&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.33"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:43:46 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:43:46Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:28:04 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:28:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:28:16 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:28:16Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-08.xml b/glsa-200903-08.xml
index 124b78c2..550b1dc5 100644
--- a/glsa-200903-08.xml
+++ b/glsa-200903-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-08">
<title>gEDA: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">geda</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>247538</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-electronics/geda-1.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-electronics/geda-1.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5148">CVE-2008-5148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5148">CVE-2008-5148</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:58:50 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:58:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:01:59 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:01:59Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:02:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:02:15Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-09.xml b/glsa-200903-09.xml
index 5db8c930..861e1b21 100644
--- a/glsa-200903-09.xml
+++ b/glsa-200903-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-09">
<title>OpenTTD: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code in the server.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>233929</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3547">CVE-2008-3547</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3576">CVE-2008-3576</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3577">CVE-2008-3577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3547">CVE-2008-3547</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3576">CVE-2008-3576</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3577">CVE-2008-3577</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:13:14 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:13:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Feb 2009 15:07:08 +0000">
+ <metadata tag="submitter" timestamp="2009-02-13T15:07:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Feb 2009 15:08:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-13T15:08:05Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-10.xml b/glsa-200903-10.xml
index 289bd796..053df346 100644
--- a/glsa-200903-10.xml
+++ b/glsa-200903-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-10">
<title>Irrlicht: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">irrlicht</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>252203</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-games/irrlicht-1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-games/irrlicht-1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5876">CVE-2008-5876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5876">CVE-2008-5876</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:12:26 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:12:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Mar 2009 23:33:30 +0000">
+ <metadata tag="submitter" timestamp="2009-03-04T23:33:30Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:13:18 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:13:18Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200903-11.xml b/glsa-200903-11.xml
index 8932857b..d7f794d9 100644
--- a/glsa-200903-11.xml
+++ b/glsa-200903-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-11">
<title>PyCrypto: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when decrypting using ARC2.
</synopsis>
<product type="ebuild">pycrypto</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>258049</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/pycrypto-2.0.1-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/pycrypto-2.0.1-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544">CVE-2009-0544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544">CVE-2009-0544</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:35:09 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:35:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:22:46 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:22:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:24:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:24:44Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-12.xml b/glsa-200903-12.xml
index c07e0736..2d1c825a 100644
--- a/glsa-200903-12.xml
+++ b/glsa-200903-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-12">
<title>OptiPNG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260265</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/optipng-0.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/optipng-0.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749">CVE-2009-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749">CVE-2009-0749</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:36:48 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:36:48Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:09:51 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:09:51Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:10:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:10:05Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-13.xml b/glsa-200903-13.xml
index f71ebb28..edfc00e1 100644
--- a/glsa-200903-13.xml
+++ b/glsa-200903-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-13">
<title>MPFR: Denial of Service</title>
<synopsis>
Multiple buffer overflows in MPFR might lead to a Denial of Service.
</synopsis>
<product type="ebuild">mpfr</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260968</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/mpfr-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/mpfr-2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0757">CVE-2009-0757</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0757">CVE-2009-0757</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:35:53 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:35:53Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:14:49 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:14:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:14:57 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:14:57Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-14.xml b/glsa-200903-14.xml
index c305283b..1e14bae4 100644
--- a/glsa-200903-14.xml
+++ b/glsa-200903-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-14">
<title>BIND: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
records authenticated using DNSSEC.
</synopsis>
<product type="ebuild">bind</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>254134</bug>
<bug>257949</bug>
<access>remote</access>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0265">CVE-2009-0265</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0265">CVE-2009-0265</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:55:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:55:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 10:41:33 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T10:41:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 10:41:40 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T10:41:40Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-15.xml b/glsa-200903-15.xml
index 23bf413e..3ab8cb10 100644
--- a/glsa-200903-15.xml
+++ b/glsa-200903-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-15">
<title>git: Multiple vulnerabilties</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">git</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>251343</bug>
<access>remote</access>
<affected>
@@ -65,20 +64,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.6.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.6.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516">CVE-2008-5516</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517">CVE-2008-5517</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916">CVE-2008-5916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516">CVE-2008-5516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517">CVE-2008-5517</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916">CVE-2008-5916</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:26:05 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:26:05Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:42:55 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:42:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:43:18 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:43:18Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-16.xml b/glsa-200903-16.xml
index 8130baec..d60c33d8 100644
--- a/glsa-200903-16.xml
+++ b/glsa-200903-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-16">
<title>Epiphany: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">epiphany</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>257000</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/epiphany-2.22.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/epiphany-2.22.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">CVE-2008-5985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">CVE-2008-5985</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:40:03 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:40:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:06:14 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:06:14Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:06:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:06:33Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-17.xml b/glsa-200903-17.xml
index 7ea40360..16a98cf7 100644
--- a/glsa-200903-17.xml
+++ b/glsa-200903-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-17">
<title>Real VNC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
connecting to a malicious server.
</synopsis>
<product type="ebuild">vnc</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>255225</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/vnc-4.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/vnc-4.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770">CVE-2008-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770">CVE-2008-4770</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Jan 2009 00:30:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-28T00:30:00Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:35:19 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:35:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:35:29 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:35:29Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-18.xml b/glsa-200903-18.xml
index 09b2f88c..d6da870a 100644
--- a/glsa-200903-18.xml
+++ b/glsa-200903-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-18">
<title>Openswan: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
for symlink attacks.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>238574</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.13-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.13-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4190">CVE-2008-4190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4190">CVE-2008-4190</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:17:28 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:17:28Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:08:11 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:08:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:08:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:08:22Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-19.xml b/glsa-200903-19.xml
index c0960eeb..db03e10d 100644
--- a/glsa-200903-19.xml
+++ b/glsa-200903-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-19">
<title>Xerces-C++: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
schema files.
</synopsis>
<product type="ebuild">xerces-c</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>240496</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/xerces-c-3.0.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/xerces-c-3.0.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4482">CVE-2008-4482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4482">CVE-2008-4482</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:39:39 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:39:39Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:13:38 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:13:38Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:13:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:13:55Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-20.xml b/glsa-200903-20.xml
index 6baa300c..3888e893 100644
--- a/glsa-200903-20.xml
+++ b/glsa-200903-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-20">
<title>WebSVN: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">websvn</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>243852</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/websvn-2.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/websvn-2.1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5918">CVE-2008-5918</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5919">CVE-2008-5919</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0240">CVE-2009-0240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5918">CVE-2008-5918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5919">CVE-2008-5919</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0240">CVE-2009-0240</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Jan 2009 11:43:28 +0000">
+ <metadata tag="requester" timestamp="2009-01-24T11:43:28Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 17:56:35 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T17:56:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 17:56:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T17:56:41Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-21.xml b/glsa-200903-21.xml
index 7fb985fd..397fbe4d 100644
--- a/glsa-200903-21.xml
+++ b/glsa-200903-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-21">
<title>cURL: Arbitrary file access</title>
<synopsis>
A vulnerability in cURL may allow for arbitrary file access.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260361</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.19.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.19.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037">CVE-2009-0037</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037">CVE-2009-0037</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:06:34 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:06:34Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:20:10 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:20:10Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:09:58 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:09:58Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-22.xml b/glsa-200903-22.xml
index 1ef54449..0725d5d4 100644
--- a/glsa-200903-22.xml
+++ b/glsa-200903-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-22">
<title>Ganglia: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ganglia</product>
- <announced>March 10, 2009</announced>
- <revised>March 10, 2009: 01</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-03-10: 01</revised>
<bug>255366</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/ganglia-3.1.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/ganglia-3.1.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241">CVE-2009-0241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241">CVE-2009-0241</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Feb 2009 00:12:46 +0000">
+ <metadata tag="requester" timestamp="2009-02-03T00:12:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:26:05 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:26:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:27:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:27:02Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-23.xml b/glsa-200903-23.xml
index eb1e3c1c..ffa42342 100644
--- a/glsa-200903-23.xml
+++ b/glsa-200903-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-23">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>March 10, 2009</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-05-28: 04</revised>
<bug>239543</bug>
<bug>251496</bug>
<bug>260264</bug>
@@ -107,31 +106,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.22.87&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.22.87"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873">CVE-2008-3873</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401">CVE-2008-4401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503">CVE-2008-4503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4818">CVE-2008-4818</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4819">CVE-2008-4819</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4821">CVE-2008-4821</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4822">CVE-2008-4822</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4823">CVE-2008-4823</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824">CVE-2008-4824</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5361">CVE-2008-5361</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5362">CVE-2008-5362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5363">CVE-2008-5363</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499">CVE-2008-5499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114">CVE-2009-0114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519">CVE-2009-0519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520">CVE-2009-0520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521">CVE-2009-0521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873">CVE-2008-3873</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401">CVE-2008-4401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503">CVE-2008-4503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4818">CVE-2008-4818</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4819">CVE-2008-4819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4821">CVE-2008-4821</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4822">CVE-2008-4822</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4823">CVE-2008-4823</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824">CVE-2008-4824</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5361">CVE-2008-5361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5362">CVE-2008-5362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5363">CVE-2008-5363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499">CVE-2008-5499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114">CVE-2009-0114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519">CVE-2009-0519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520">CVE-2009-0520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521">CVE-2009-0521</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 11:37:22 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T11:37:22Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 12:37:48 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T12:37:48Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-24.xml b/glsa-200903-24.xml
index 1d756bf6..5fb39398 100644
--- a/glsa-200903-24.xml
+++ b/glsa-200903-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-24">
<title>Shadow: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
root privileges.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>March 10, 2009</announced>
- <revised>March 10, 2009: 01</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-03-10: 01</revised>
<bug>251320</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/shadow-4.1.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.1.2.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394">CVE-2008-5394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394">CVE-2008-5394</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:41:17 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:41:17Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2009 19:05:06 +0000">
+ <metadata tag="submitter" timestamp="2009-03-08T19:05:06Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Mar 2009 19:05:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-08T19:05:15Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-25.xml b/glsa-200903-25.xml
index 791fe8fc..762ec8f5 100644
--- a/glsa-200903-25.xml
+++ b/glsa-200903-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-25">
<title>Courier Authentication Library: SQL Injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Authentication Library.
</synopsis>
<product type="ebuild">courier-authlib</product>
- <announced>March 11, 2009</announced>
- <revised>March 11, 2009: 01</revised>
+ <announced>2009-03-11</announced>
+ <revised>2009-03-11: 01</revised>
<bug>252576</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/courier-authlib-0.62.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/courier-authlib-0.62.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380">CVE-2008-2380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380">CVE-2008-2380</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:32:02 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T18:32:02Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Mar 2009 12:55:53 +0000">
+ <metadata tag="submitter" timestamp="2009-03-10T12:55:53Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 10:55:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T10:55:30Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-26.xml b/glsa-200903-26.xml
index f6b463a4..b44f175c 100644
--- a/glsa-200903-26.xml
+++ b/glsa-200903-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-26">
<title>TMSNC: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when processing an instant message.
</synopsis>
<product type="ebuild">tmsnc</product>
- <announced>March 12, 2009</announced>
- <revised>March 12, 2009: 01</revised>
+ <announced>2009-03-12</announced>
+ <revised>2009-03-12: 01</revised>
<bug>229157</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
such as CenterIM or Pebrot:
</p>
<code>
- # emerge --unmerge &quot;net-im/tmsnc&quot;</code>
+ # emerge --unmerge "net-im/tmsnc"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2828">CVE-2008-2828</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2828">CVE-2008-2828</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Mar 2009 22:52:54 +0000">
+ <metadata tag="requester" timestamp="2009-03-10T22:52:54Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Mar 2009 12:01:45 +0000">
+ <metadata tag="submitter" timestamp="2009-03-11T12:01:45Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 12:02:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T12:02:24Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200903-27.xml b/glsa-200903-27.xml
index ea9f08b2..dfb373e1 100644
--- a/glsa-200903-27.xml
+++ b/glsa-200903-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-27">
<title>ProFTPD: Multiple vulnerabilities</title>
<synopsis>
Two vulnerabilities in ProFTPD might allow for SQL injection attacks.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>March 12, 2009</announced>
- <revised>March 12, 2009: 01</revised>
+ <announced>2009-03-12</announced>
+ <revised>2009-03-12: 01</revised>
<bug>258450</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542">CVE-2009-0542</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0543">CVE-2009-0543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542">CVE-2009-0542</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0543">CVE-2009-0543</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:36:42 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T18:36:42Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Mar 2009 12:43:00 +0000">
+ <metadata tag="submitter" timestamp="2009-03-12T12:43:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Mar 2009 12:43:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-12T12:43:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-28.xml b/glsa-200903-28.xml
index 186a14e9..8b34c3c2 100644
--- a/glsa-200903-28.xml
+++ b/glsa-200903-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-28">
<title>libpng: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code
</synopsis>
<product type="ebuild">libpng</product>
- <announced>March 15, 2009</announced>
- <revised>March 15, 2009: 01</revised>
+ <announced>2009-03-15</announced>
+ <revised>2009-03-15: 01</revised>
<bug>244808</bug>
<bug>255231</bug>
<bug>259578</bug>
@@ -68,20 +67,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.35"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907">CVE-2008-5907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218">CVE-2008-6218</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040">CVE-2009-0040</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907">CVE-2008-5907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218">CVE-2008-6218</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040">CVE-2009-0040</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:45:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:45:00Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Feb 2009 19:13:22 +0000">
+ <metadata tag="submitter" timestamp="2009-02-13T19:13:22Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Mar 2009 19:09:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-13T19:09:44Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-29.xml b/glsa-200903-29.xml
index f1dcf896..324b1ef4 100644
--- a/glsa-200903-29.xml
+++ b/glsa-200903-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-29">
<title>BlueZ: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">bluez-utils bluez-libs</product>
- <announced>March 16, 2009</announced>
- <revised>March 16, 2009: 01</revised>
+ <announced>2009-03-16</announced>
+ <revised>2009-03-16: 01</revised>
<bug>230591</bug>
<access>local, remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-utils-3.36&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-utils-3.36"</code>
<p>
All bluez-libs users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-libs-3.36&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-libs-3.36"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374">CVE-2008-2374</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374">CVE-2008-2374</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Mar 2009 19:03:24 +0000">
+ <metadata tag="requester" timestamp="2009-03-11T19:03:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 19:04:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T19:04:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Mar 2009 12:49:09 +0000">
+ <metadata tag="submitter" timestamp="2009-03-13T12:49:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-30.xml b/glsa-200903-30.xml
index 1375ec56..3ed54ef5 100644
--- a/glsa-200903-30.xml
+++ b/glsa-200903-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-30">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>March 16, 2009</announced>
- <revised>March 17, 2009: 02</revised>
+ <announced>2009-03-16</announced>
+ <revised>2009-03-17: 02</revised>
<bug>247229</bug>
<bug>261032</bug>
<access>remote</access>
@@ -68,24 +67,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.64&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.64"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5178">CVE-2008-5178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679">CVE-2008-5679</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680">CVE-2008-5680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681">CVE-2008-5681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682">CVE-2008-5682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683">CVE-2008-5683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914">CVE-2009-0914</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5178">CVE-2008-5178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679">CVE-2008-5679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680">CVE-2008-5680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681">CVE-2008-5681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682">CVE-2008-5682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683">CVE-2008-5683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914">CVE-2009-0914</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 09:16:02 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T09:16:02Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 15:15:16 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T15:15:16Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 21:43:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T21:43:27Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-31.xml b/glsa-200903-31.xml
index 9bad652f..d4f02ac1 100644
--- a/glsa-200903-31.xml
+++ b/glsa-200903-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-31">
<title>libcdaudio: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libcdaudio</product>
- <announced>March 17, 2009</announced>
- <revised>March 17, 2009: 01</revised>
+ <announced>2009-03-17</announced>
+ <revised>2009-03-17: 01</revised>
<bug>245649</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libcdaudio-0.99.12-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libcdaudio-0.99.12-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5030">CVE-2008-5030</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5030">CVE-2008-5030</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2009 12:45:13 +0000">
+ <metadata tag="submitter" timestamp="2009-03-16T12:45:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 12:45:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T12:45:24Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-32.xml b/glsa-200903-32.xml
index 58e36f11..cf33c151 100644
--- a/glsa-200903-32.xml
+++ b/glsa-200903-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-32">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow for remote code execution.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>March 18, 2009</announced>
- <revised>March 18, 2009: 01</revised>
+ <announced>2009-03-18</announced>
+ <revised>2009-03-18: 01</revised>
<bug>237781</bug>
<bug>244914</bug>
<bug>246831</bug>
@@ -76,23 +75,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.9.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.9.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942">CVE-2006-6942</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5977">CVE-2007-5977</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4096">CVE-2008-4096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4775">CVE-2008-4775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621">CVE-2008-5621</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622">CVE-2008-5622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942">CVE-2006-6942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5977">CVE-2007-5977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4096">CVE-2008-4096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4775">CVE-2008-4775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621">CVE-2008-5621</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622">CVE-2008-5622</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Sep 2008 18:59:26 +0000">
+ <metadata tag="requester" timestamp="2008-09-23T18:59:26Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2009 23:58:57 +0000">
+ <metadata tag="submitter" timestamp="2009-03-14T23:58:57Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 21:41:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T21:41:59Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-33.xml b/glsa-200903-33.xml
index 58fb59fc..018dafe8 100644
--- a/glsa-200903-33.xml
+++ b/glsa-200903-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-33">
<title>FFmpeg: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">ffmpeg gst-plugins-ffmpeg mplayer</product>
- <announced>March 19, 2009</announced>
- <revised>March 19, 2009: 01</revised>
+ <announced>2009-03-19</announced>
+ <revised>2009-03-19: 01</revised>
<bug>231831</bug>
<bug>231834</bug>
<bug>245313</bug>
@@ -76,35 +75,35 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20090201&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20090201"</code>
<p>
All gst-plugins-ffmpeg users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-ffmpeg-0.10.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-ffmpeg-0.10.5"</code>
<p>
All Mplayer users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p28450&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p28450"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162 ">CVE-2008-3162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866">CVE-2008-4866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867">CVE-2008-4867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868">CVE-2008-4868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4869">CVE-2008-4869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385">CVE-2009-0385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162 ">CVE-2008-3162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866">CVE-2008-4866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867">CVE-2008-4867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868">CVE-2008-4868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4869">CVE-2008-4869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385">CVE-2009-0385</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Oct 2008 21:30:59 +0000">
+ <metadata tag="requester" timestamp="2008-10-31T21:30:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Mar 2009 22:05:30 +0000">
+ <metadata tag="submitter" timestamp="2009-03-17T22:05:30Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Mar 2009 22:05:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-17T22:05:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-34.xml b/glsa-200903-34.xml
index bcce88f6..f25adcdf 100644
--- a/glsa-200903-34.xml
+++ b/glsa-200903-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-34">
<title>Amarok: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>March 20, 2009</announced>
- <revised>March 20, 2009: 01</revised>
+ <announced>2009-03-20</announced>
+ <revised>2009-03-20: 01</revised>
<bug>254896</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135">CVE-2009-0135</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136">CVE-2009-0136</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135">CVE-2009-0135</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136">CVE-2009-0136</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Mar 2009 13:02:32 +0000">
+ <metadata tag="requester" timestamp="2009-03-19T13:02:32Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 20 Mar 2009 19:39:32 +0000">
+ <metadata tag="submitter" timestamp="2009-03-20T19:39:32Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 Mar 2009 19:54:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-20T19:54:30Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200903-35.xml b/glsa-200903-35.xml
index 19676e85..205b21b1 100644
--- a/glsa-200903-35.xml
+++ b/glsa-200903-35.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-35">
<title>Muttprint: Insecure temporary file usage</title>
<synopsis>
An insecure temporary file usage in Muttprint allows for symlink attacks.
</synopsis>
<product type="ebuild">muttprint</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>250554</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/muttprint-0.72d-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/muttprint-0.72d-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5368">CVE-2008-5368</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5368">CVE-2008-5368</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:25:26 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:25:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 21:59:17 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T21:59:17Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Mar 2009 21:59:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-22T21:59:46Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200903-36.xml b/glsa-200903-36.xml
index 4d6b6ab1..c00cde52 100644
--- a/glsa-200903-36.xml
+++ b/glsa-200903-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-36">
<title>MLDonkey: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclose arbitrary files.
</synopsis>
<product type="ebuild">mldonkey</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>260072</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/mldonkey-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/mldonkey-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0753">CVE-2009-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0753">CVE-2009-0753</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:26:47 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:26:47Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 20:38:08 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T20:38:08Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Mar 2009 22:00:11 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-22T22:00:11Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200903-37.xml b/glsa-200903-37.xml
index 3dc6e1f3..aed5a11a 100644
--- a/glsa-200903-37.xml
+++ b/glsa-200903-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-37">
<title>Ghostscript: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl ghostscript-esp ghostscript-gnu</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>261087</bug>
<access>remote</access>
<affected>
@@ -62,34 +61,34 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gpl-8.64-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gpl-8.64-r2"</code>
<p>
All GNU Ghostscript users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gnu-8.62.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gnu-8.62.0"</code>
<p>
We recommend that users unmerge ESP Ghostscript and use GPL or GNU
Ghostscript instead:
</p>
<code>
- # emerge --unmerge &quot;app-text/ghostscript-esp&quot;</code>
+ # emerge --unmerge "app-text/ghostscript-esp"</code>
<p>
For installation instructions, see above.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583">CVE-2009-0583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584">CVE-2009-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583">CVE-2009-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584">CVE-2009-0584</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:18:05 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:18:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 21:04:31 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T21:04:31Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Mar 2009 13:39:36 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-23T13:39:36Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200903-38.xml b/glsa-200903-38.xml
index 8e90dfae..86aa8514 100644
--- a/glsa-200903-38.xml
+++ b/glsa-200903-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-38">
<title>Squid: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attacks.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>March 24, 2009</announced>
- <revised>March 24, 2009: 01</revised>
+ <announced>2009-03-24</announced>
+ <revised>2009-03-24: 01</revised>
<bug>216319</bug>
<bug>257585</bug>
<access>remote</access>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.7.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612">CVE-2008-1612</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478">CVE-2009-0478</uri>
- <uri link="/security/en/glsa/glsa-200801-05.xml">GLSA-200801-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612">CVE-2008-1612</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478">CVE-2009-0478</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-05.xml">GLSA-200801-05</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Mar 2009 14:14:34 +0000">
+ <metadata tag="requester" timestamp="2009-03-09T14:14:34Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2009 14:25:11 +0000">
+ <metadata tag="submitter" timestamp="2009-03-16T14:25:11Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Mar 2009 16:45:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-24T16:45:49Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-39.xml b/glsa-200903-39.xml
index 77043c49..a1a5f70f 100644
--- a/glsa-200903-39.xml
+++ b/glsa-200903-39.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-39">
<title>pam_krb5: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges or overwrite arbitrary files.
</synopsis>
<product type="ebuild">pam_krb5</product>
- <announced>March 25, 2009</announced>
- <revised>March 25, 2009: 01</revised>
+ <announced>2009-03-25</announced>
+ <revised>2009-03-25: 01</revised>
<bug>257075</bug>
<access>local</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_krb5-3.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_krb5-3.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360">CVE-2009-0360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361">CVE-2009-0361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360">CVE-2009-0360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361">CVE-2009-0361</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:23:59 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:23:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 12:57:24 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T12:57:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 12:57:36 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T12:57:36Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-40.xml b/glsa-200903-40.xml
index 795b9816..a19c712d 100644
--- a/glsa-200903-40.xml
+++ b/glsa-200903-40.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-40">
<title>Analog: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was discovered in Analog.
</synopsis>
<product type="ebuild">analog</product>
- <announced>March 29, 2009</announced>
- <revised>March 29, 2009: 01</revised>
+ <announced>2009-03-29</announced>
+ <revised>2009-03-29: 01</revised>
<bug>249140</bug>
<access>local</access>
<affected>
@@ -47,22 +46,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/analog-6.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/analog-6.0-r2"</code>
<p>
NOTE: Analog is now linked against the system bzip2 library.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
- <uri link="/security/en/glsa/glsa-200804-02.xml">GLSA 200804-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-02.xml">GLSA 200804-02</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Dec 2008 20:13:59 +0000">
+ <metadata tag="requester" timestamp="2008-12-21T20:13:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Mar 2009 12:22:59 +0000">
+ <metadata tag="submitter" timestamp="2009-03-26T12:22:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Mar 2009 12:23:07 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-26T12:23:07Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200903-41.xml b/glsa-200903-41.xml
index 57982930..ce1ac358 100644
--- a/glsa-200903-41.xml
+++ b/glsa-200903-41.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-41">
<title>gedit: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">gedit</product>
- <announced>March 30, 2009</announced>
- <revised>March 30, 2009: 01</revised>
+ <announced>2009-03-30</announced>
+ <revised>2009-03-30: 01</revised>
<bug>257004</bug>
<access>local</access>
<affected>
@@ -48,25 +47,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.22.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.22.3-r1"</code>
<p>
All gedit 2.24.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.24.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.24.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0314">CVE-2009-0314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0314">CVE-2009-0314</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Mar 2009 09:17:57 +0000">
+ <metadata tag="requester" timestamp="2009-03-23T09:17:57Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Mar 2009 11:46:10 +0000">
+ <metadata tag="submitter" timestamp="2009-03-30T11:46:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Mar 2009 11:46:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-30T11:46:20Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-01.xml b/glsa-200904-01.xml
index 7d63424c..cfc31531 100644
--- a/glsa-200904-01.xml
+++ b/glsa-200904-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-01">
<title>Openfire: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>April 02, 2009</announced>
- <revised>April 02, 2009: 01</revised>
+ <announced>2009-04-02</announced>
+ <revised>2009-04-02: 01</revised>
<bug>246008</bug>
<bug>254309</bug>
<access>remote</access>
@@ -77,20 +76,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/openfire-3.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/openfire-3.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6508">CVE-2008-6508</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6509">CVE-2008-6509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6510">CVE-2008-6510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6511">CVE-2008-6511</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496">CVE-2009-0496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0497">CVE-2009-0497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6508">CVE-2008-6508</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6509">CVE-2008-6509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6510">CVE-2008-6510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6511">CVE-2008-6511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496">CVE-2009-0496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0497">CVE-2009-0497</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 21 Mar 2009 10:46:26 +0000">
+ <metadata tag="submitter" timestamp="2009-03-21T10:46:26Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Mar 2009 11:36:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-21T11:36:24Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-02.xml b/glsa-200904-02.xml
index 63cd31cf..cb414af7 100644
--- a/glsa-200904-02.xml
+++ b/glsa-200904-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-02">
<title>GLib: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when performing base64 conversion.
</synopsis>
<product type="ebuild">glib</product>
- <announced>April 03, 2009</announced>
- <revised>April 05, 2009: 02</revised>
+ <announced>2009-04-03</announced>
+ <revised>2009-04-05: 02</revised>
<bug>249214</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.18.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.18.4-r1"</code>
<p>
All GLib 2.16 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.16.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.16.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316">CVE-2008-4316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316">CVE-2008-4316</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Apr 2009 12:01:03 +0000">
+ <metadata tag="requester" timestamp="2009-04-02T12:01:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:09:57 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:09:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:10:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:10:20Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-03.xml b/glsa-200904-03.xml
index 167fd1f6..7547f6b6 100644
--- a/glsa-200904-03.xml
+++ b/glsa-200904-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-03">
<title>Gnumeric: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gnumeric</product>
- <announced>April 03, 2009</announced>
- <revised>April 03, 2009: 01</revised>
+ <announced>2009-04-03</announced>
+ <revised>2009-04-03: 01</revised>
<bug>257012</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.8.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.8.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318">CVE-2009-0318</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318">CVE-2009-0318</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:39:58 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:39:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:40:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:40:05Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-04.xml b/glsa-200904-04.xml
index 2f5e18ba..9ba68ebb 100644
--- a/glsa-200904-04.xml
+++ b/glsa-200904-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-04">
<title>WeeChat: Denial of Service</title>
<synopsis>
A processing error in WeeChat might lead to a Denial of Service.
</synopsis>
<product type="ebuild">weechat</product>
- <announced>April 04, 2009</announced>
- <revised>April 04, 2009: 01</revised>
+ <announced>2009-04-04</announced>
+ <revised>2009-04-04: 01</revised>
<bug>262997</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/weechat-0.2.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/weechat-0.2.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0661">CVE-2009-0661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0661">CVE-2009-0661</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 15:10:01 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T15:10:01Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 15:21:46 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T15:21:46Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 17:18:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T17:18:54Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200904-05.xml b/glsa-200904-05.xml
index e9834b2d..55ea929d 100644
--- a/glsa-200904-05.xml
+++ b/glsa-200904-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-05">
<title>ntp: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing attacks.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>April 05, 2009</announced>
- <revised>April 05, 2009: 01</revised>
+ <announced>2009-04-05</announced>
+ <revised>2009-04-05: 01</revised>
<bug>254098</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021">CVE-2009-0021</uri>
- <uri link="/security/en/glsa/glsa-200902-02.xml">GLSA 200902-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021">CVE-2009-0021</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200902-02.xml">GLSA 200902-02</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 31 Mar 2009 11:41:38 +0000">
+ <metadata tag="submitter" timestamp="2009-03-31T11:41:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Mar 2009 11:41:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-31T11:41:46Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-06.xml b/glsa-200904-06.xml
index 2e5d7da1..3311bd7e 100644
--- a/glsa-200904-06.xml
+++ b/glsa-200904-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-06">
<title>Eye of GNOME: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">eog</product>
- <announced>April 06, 2009</announced>
- <revised>April 06, 2009: 01</revised>
+ <announced>2009-04-06</announced>
+ <revised>2009-04-06: 01</revised>
<bug>257002</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/eog-2.22.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/eog-2.22.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5987">CVE-2008-5987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5987">CVE-2008-5987</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 06 Apr 2009 11:38:51 +0000">
+ <metadata tag="submitter" timestamp="2009-04-06T11:38:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Apr 2009 11:40:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-06T11:40:09Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-07.xml b/glsa-200904-07.xml
index c9fbbfd3..89888c2f 100644
--- a/glsa-200904-07.xml
+++ b/glsa-200904-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-07">
<title>Xpdf: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">xpdf</product>
- <announced>April 07, 2009</announced>
- <revised>April 07, 2009: 01</revised>
+ <announced>2009-04-07</announced>
+ <revised>2009-04-07: 01</revised>
<bug>242930</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.02-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.02-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1144">CVE-2009-1144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1144">CVE-2009-1144</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 12:41:57 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T12:41:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 12:52:05 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T12:52:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 12:52:11 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T12:52:11Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-08.xml b/glsa-200904-08.xml
index 56ff61a1..3c23853d 100644
--- a/glsa-200904-08.xml
+++ b/glsa-200904-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-08">
<title>OpenSSL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certificate details.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>April 07, 2009</announced>
- <revised>April 07, 2009: 01</revised>
+ <announced>2009-04-07</announced>
+ <revised>2009-04-07: 01</revised>
<bug>263751</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8k&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8k"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590">CVE-2009-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590">CVE-2009-0590</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 13:16:21 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T13:16:21Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 13:41:11 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T13:41:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 13:41:45 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T13:41:45Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-09.xml b/glsa-200904-09.xml
index acfe6366..60d2fcb2 100644
--- a/glsa-200904-09.xml
+++ b/glsa-200904-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-09">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthenticated users to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>262736</bug>
<bug>263398</bug>
<access>remote</access>
@@ -65,18 +64,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.6.3-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.6.3-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844">CVE-2009-0844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845">CVE-2009-0845</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846">CVE-2009-0846</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847">CVE-2009-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844">CVE-2009-0844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845">CVE-2009-0845</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846">CVE-2009-0846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847">CVE-2009-0847</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Apr 2009 01:07:26 +0000">
+ <metadata tag="submitter" timestamp="2009-04-08T01:07:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Apr 2009 18:19:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-08T18:19:31Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-10.xml b/glsa-200904-10.xml
index 1aff889e..bd0c7fc6 100644
--- a/glsa-200904-10.xml
+++ b/glsa-200904-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-10">
<title>Avahi: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>260971</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.24-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.24-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758">CVE-2009-0758</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758">CVE-2009-0758</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 13:49:21 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T13:49:21Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 13:56:36 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T13:56:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 13:57:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T13:57:02Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-11.xml b/glsa-200904-11.xml
index a16c7c5f..7deb9698 100644
--- a/glsa-200904-11.xml
+++ b/glsa-200904-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-11">
<title>Tor: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, escalation of privileges and information disclosure.
</synopsis>
<product type="ebuild">tor</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>250018</bug>
<bug>256078</bug>
<bug>258833</bug>
@@ -72,24 +71,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.2.0.34&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.2.0.34"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5397">CVE-2008-5397</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5398">CVE-2008-5398</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0414">CVE-2009-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0936">CVE-2009-0936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0937">CVE-2009-0937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0938">CVE-2009-0938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0939">CVE-2009-0939</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5397">CVE-2008-5397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5398">CVE-2008-5398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0414">CVE-2009-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0936">CVE-2009-0936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0937">CVE-2009-0937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0938">CVE-2009-0938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0939">CVE-2009-0939</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Jan 2009 14:41:40 +0000">
+ <metadata tag="requester" timestamp="2009-01-25T14:41:40Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:48:01 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:48:01Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:48:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:48:17Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-12.xml b/glsa-200904-12.xml
index 6af7ae73..03d6ecff 100644
--- a/glsa-200904-12.xml
+++ b/glsa-200904-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-12">
<title>Wicd: Information disclosure</title>
<synopsis>
A vulnerability in Wicd may allow for disclosure of sensitive information.
</synopsis>
<product type="ebuild">wicd</product>
- <announced>April 10, 2009</announced>
- <revised>April 10, 2009: 01</revised>
+ <announced>2009-04-10</announced>
+ <revised>2009-04-10: 01</revised>
<bug>258596</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/wicd-1.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/wicd-1.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0489">CVE-2009-0489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0489">CVE-2009-0489</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Apr 2009 22:52:50 +0000">
+ <metadata tag="requester" timestamp="2009-04-08T22:52:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Apr 2009 11:29:45 +0000">
+ <metadata tag="submitter" timestamp="2009-04-09T11:29:45Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Apr 2009 21:59:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-09T21:59:43Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-13.xml b/glsa-200904-13.xml
index bf2c7dd8..3d7f7bc0 100644
--- a/glsa-200904-13.xml
+++ b/glsa-200904-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-13">
<title>Ventrilo: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">ventrilo-server-bin</product>
- <announced>April 14, 2009</announced>
- <revised>April 14, 2009: 01</revised>
+ <announced>2009-04-14</announced>
+ <revised>2009-04-14: 01</revised>
<bug>234819</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/ventrilo-server-bin-3.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/ventrilo-server-bin-3.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3680">CVE-2008-3680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3680">CVE-2008-3680</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 14 Apr 2009 12:02:23 +0000">
+ <metadata tag="submitter" timestamp="2009-04-14T12:02:23Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Apr 2009 12:03:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-14T12:03:30Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-14.xml b/glsa-200904-14.xml
index 22463190..c5560851 100644
--- a/glsa-200904-14.xml
+++ b/glsa-200904-14.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-14">
<title>F-PROT Antivirus: Multiple Denial of Service vulnerabilities</title>
<synopsis>
Multiple errors in F-PROT Antivirus may lead to a Denial of Service.
</synopsis>
<product type="ebuild">f-prot</product>
- <announced>April 14, 2009</announced>
- <revised>April 17, 2009: 04</revised>
+ <announced>2009-04-14</announced>
+ <revised>2009-04-17: 04</revised>
<bug>232665</bug>
<bug>253497</bug>
<access>remote</access>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/f-prot-6.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/f-prot-6.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3243">CVE-2008-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3244">CVE-2008-3244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5747">CVE-2008-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3243">CVE-2008-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3244">CVE-2008-3244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5747">CVE-2008-5747</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Apr 2009 22:38:56 +0000">
+ <metadata tag="requester" timestamp="2009-04-08T22:38:56Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Apr 2009 21:12:22 +0000">
+ <metadata tag="submitter" timestamp="2009-04-10T21:12:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Apr 2009 21:13:03 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-10T21:13:03Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-15.xml b/glsa-200904-15.xml
index e448c292..701079e5 100644
--- a/glsa-200904-15.xml
+++ b/glsa-200904-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-15">
<title>mpg123: User-assisted execution of arbitrary code</title>
<synopsis>
An error in mpg123 might allow for the execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>April 16, 2009</announced>
- <revised>April 16, 2009: 01</revised>
+ <announced>2009-04-16</announced>
+ <revised>2009-04-16: 01</revised>
<bug>265342</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-1.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-1.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301">CVE-2009-1301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301">CVE-2009-1301</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Apr 2009 20:51:15 +0000">
+ <metadata tag="requester" timestamp="2009-04-11T20:51:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2009 21:15:29 +0000">
+ <metadata tag="submitter" timestamp="2009-04-11T21:15:29Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 21:52:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T21:52:59Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200904-16.xml b/glsa-200904-16.xml
index 734f5c1f..1ac6e366 100644
--- a/glsa-200904-16.xml
+++ b/glsa-200904-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-16">
<title>libsndfile: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>April 17, 2009</announced>
- <revised>April 17, 2009: 01</revised>
+ <announced>2009-04-17</announced>
+ <revised>2009-04-17: 01</revised>
<bug>261173</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186">CVE-2009-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186">CVE-2009-0186</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Apr 2009 20:06:42 +0000">
+ <metadata tag="requester" timestamp="2009-04-15T20:06:42Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 18:44:04 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T18:44:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 18:44:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T18:44:13Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200904-17.xml b/glsa-200904-17.xml
index 8123c5b6..8d429ffb 100644
--- a/glsa-200904-17.xml
+++ b/glsa-200904-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-17">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>April 18, 2009</announced>
- <revised>April 18, 2009: 01</revised>
+ <announced>2009-04-18</announced>
+ <revised>2009-04-18: 01</revised>
<bug>259992</bug>
<access>remote</access>
<affected>
@@ -78,23 +77,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193">CVE-2009-0193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658">CVE-2009-0658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927">CVE-2009-0927</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928">CVE-2009-0928</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061">CVE-2009-1061</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062">CVE-2009-1062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193">CVE-2009-0193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658">CVE-2009-0658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927">CVE-2009-0927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928">CVE-2009-0928</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061">CVE-2009-1061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062">CVE-2009-1062</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Apr 2009 12:25:56 +0000">
+ <metadata tag="requester" timestamp="2009-04-14T12:25:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 22:30:05 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T22:30:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 22:30:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T22:30:15Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200904-18.xml b/glsa-200904-18.xml
index c9352bf2..425e3e56 100644
--- a/glsa-200904-18.xml
+++ b/glsa-200904-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-18">
<title>udev: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">udev</product>
- <announced>April 18, 2009</announced>
- <revised>April 18, 2009: 01</revised>
+ <announced>2009-04-18</announced>
+ <revised>2009-04-18: 01</revised>
<bug>266290</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/udev-124-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/udev-124-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185">CVE-2009-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186">CVE-2009-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185">CVE-2009-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186">CVE-2009-1186</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Apr 2009 09:13:51 +0000">
+ <metadata tag="requester" timestamp="2009-04-16T09:13:51Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 09:38:24 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T09:38:24Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Apr 2009 18:32:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-18T18:32:47Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200904-19.xml b/glsa-200904-19.xml
index 9c75e803..f04c018f 100644
--- a/glsa-200904-19.xml
+++ b/glsa-200904-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-19">
<title>LittleCMS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">littlecms</product>
- <announced>April 19, 2009</announced>
- <revised>April 19, 2009: 01</revised>
+ <announced>2009-04-19</announced>
+ <revised>2009-04-19: 01</revised>
<bug>260269</bug>
<bug>264604</bug>
<access>remote</access>
@@ -64,21 +63,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/lcms-1.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/lcms-1.18-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581">CVE-2009-0581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723">CVE-2009-0723</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733">CVE-2009-0733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793">CVE-2009-0793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581">CVE-2009-0581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723">CVE-2009-0723</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733">CVE-2009-0733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793">CVE-2009-0793</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Apr 2009 15:32:46 +0000">
+ <metadata tag="requester" timestamp="2009-04-12T15:32:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Apr 2009 22:41:26 +0000">
+ <metadata tag="submitter" timestamp="2009-04-18T22:41:26Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Apr 2009 12:36:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-19T12:36:20Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200904-20.xml b/glsa-200904-20.xml
index cc9a1fa4..2d1f9bf5 100644
--- a/glsa-200904-20.xml
+++ b/glsa-200904-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-20">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or DNS rebinding attacks.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 23, 2009</announced>
- <revised>April 23, 2009: 01</revised>
+ <announced>2009-04-23</announced>
+ <revised>2009-04-23: 01</revised>
<bug>263070</bug>
<access>remote</access>
<affected>
@@ -61,22 +60,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.3.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146">CVE-2009-0146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147">CVE-2009-0147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163">CVE-2009-0163</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164">CVE-2009-0164</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166">CVE-2009-0166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146">CVE-2009-0146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147">CVE-2009-0147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163">CVE-2009-0163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164">CVE-2009-0164</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166">CVE-2009-0166</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Apr 2009 08:43:52 +0000">
+ <metadata tag="requester" timestamp="2009-04-20T08:43:52Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Apr 2009 11:20:52 +0000">
+ <metadata tag="submitter" timestamp="2009-04-20T11:20:52Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Apr 2009 19:42:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-21T19:42:53Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200905-01.xml b/glsa-200905-01.xml
index 8352e3ef..134e6b0c 100644
--- a/glsa-200905-01.xml
+++ b/glsa-200905-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-01">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and username disclosure.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>May 02, 2009</announced>
- <revised>May 02, 2009: 01</revised>
+ <announced>2009-05-02</announced>
+ <revised>2009-05-02: 01</revised>
<bug>218966</bug>
<bug>224835</bug>
<bug>232696</bug>
@@ -62,24 +61,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.32&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.32"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897">CVE-2008-1897</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119">CVE-2008-2119</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3263">CVE-2008-3263</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3264">CVE-2008-3264</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3903">CVE-2008-3903</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5558">CVE-2008-5558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0041">CVE-2009-0041</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897">CVE-2008-1897</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119">CVE-2008-2119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3263">CVE-2008-3263</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3264">CVE-2008-3264</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3903">CVE-2008-3903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5558">CVE-2008-5558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0041">CVE-2009-0041</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Apr 2009 12:17:04 +0000">
+ <metadata tag="requester" timestamp="2009-04-02T12:17:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:31:27 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:31:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:32:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:32:59Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200905-02.xml b/glsa-200905-02.xml
index 5e47c85e..01f8f9d1 100644
--- a/glsa-200905-02.xml
+++ b/glsa-200905-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-02">
<title>Cscope: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>263023</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.7a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.7a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148">CVE-2009-0148</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577">CVE-2009-1577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148">CVE-2009-0148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577">CVE-2009-1577</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 May 2009 18:51:15 +0000">
+ <metadata tag="requester" timestamp="2009-05-03T18:51:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 May 2009 12:25:17 +0000">
+ <metadata tag="submitter" timestamp="2009-05-04T12:25:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 04 May 2009 12:25:25 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-04T12:25:25Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200905-03.xml b/glsa-200905-03.xml
index 0048e249..437a9269 100644
--- a/glsa-200905-03.xml
+++ b/glsa-200905-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-03">
<title>IPSec Tools: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>267135</bug>
<access>remote</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574">CVE-2009-1574</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632">CVE-2009-1632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574">CVE-2009-1574</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632">CVE-2009-1632</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 21:47:03 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T21:47:03Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 10:56:09 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T10:56:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 May 2009 07:52:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-23T07:52:41Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200905-04.xml b/glsa-200905-04.xml
index 330ac17a..9b9ea3f3 100644
--- a/glsa-200905-04.xml
+++ b/glsa-200905-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-04">
<title>GnuTLS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing or the generation of invalid keys.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>267774</bug>
<access>remote</access>
<affected>
@@ -63,20 +62,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.6.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.6.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415">CVE-2009-1415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1416">CVE-2009-1416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417">CVE-2009-1417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415">CVE-2009-1415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1416">CVE-2009-1416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417">CVE-2009-1417</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 18:48:21 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T18:48:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 11:40:21 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T11:40:21Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 11:17:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T11:17:39Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200905-05.xml b/glsa-200905-05.xml
index 1b1fce39..e3bdf259 100644
--- a/glsa-200905-05.xml
+++ b/glsa-200905-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-05">
<title>FreeType: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 24, 2009</announced>
- <revised>May 25, 2009: 02</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-25: 02</revised>
<bug>263032</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946">CVE-2009-0946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946">CVE-2009-0946</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 18:49:58 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T18:49:58Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 11:07:09 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T11:07:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 13:55:28 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T13:55:28Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200905-06.xml b/glsa-200905-06.xml
index 5acd305c..d0416777 100644
--- a/glsa-200905-06.xml
+++ b/glsa-200905-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-06">
<title>acpid: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">acpid</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>268079</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-power/acpid-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-power/acpid-1.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798">CVE-2009-0798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798">CVE-2009-0798</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 May 2009 00:11:41 +0000">
+ <metadata tag="requester" timestamp="2009-05-24T00:11:41Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 May 2009 00:29:02 +0000">
+ <metadata tag="submitter" timestamp="2009-05-24T00:29:02Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 18:05:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T18:05:05Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200905-07.xml b/glsa-200905-07.xml
index 87e7d345..277c4874 100644
--- a/glsa-200905-07.xml
+++ b/glsa-200905-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-07">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>May 25, 2009</announced>
- <revised>May 25, 2009: 01</revised>
+ <announced>2009-05-25</announced>
+ <revised>2009-05-25: 01</revised>
<bug>270811</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373">CVE-2009-1373</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374">CVE-2009-1374</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375">CVE-2009-1375</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
- <uri link="/security/en/glsa/glsa-200901-13.xml">GLSA 200901-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373">CVE-2009-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374">CVE-2009-1374</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375">CVE-2009-1375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200901-13.xml">GLSA 200901-13</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 17:46:41 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T17:46:41Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 17:46:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T17:46:49Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200905-08.xml b/glsa-200905-08.xml
index 1bf5ed4a..a77c8ffe 100644
--- a/glsa-200905-08.xml
+++ b/glsa-200905-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-08">
<title>NTP: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>May 26, 2009</announced>
- <revised>May 26, 2009: 01</revised>
+ <announced>2009-05-26</announced>
+ <revised>2009-05-26: 01</revised>
<bug>263033</bug>
<bug>268962</bug>
<access>remote</access>
@@ -67,16 +66,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159">CVE-2009-0159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252">CVE-2009-1252</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159">CVE-2009-0159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252">CVE-2009-1252</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 17:26:27 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T17:26:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 17:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T17:27:05Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200905-09.xml b/glsa-200905-09.xml
index 420cc0a1..f6de8fe5 100644
--- a/glsa-200905-09.xml
+++ b/glsa-200905-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-09">
<title>libsndfile: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>May 27, 2009</announced>
- <revised>May 27, 2009: 01</revised>
+ <announced>2009-05-27</announced>
+ <revised>2009-05-27: 01</revised>
<bug>269863</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788">CVE-2009-1788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791">CVE-2009-1791</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788">CVE-2009-1788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791">CVE-2009-1791</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 May 2009 17:42:40 +0000">
+ <metadata tag="requester" timestamp="2009-05-22T17:42:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 09:17:01 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T09:17:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 11:57:08 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T11:57:08Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-200906-01.xml b/glsa-200906-01.xml
index b046010b..958e49f6 100644
--- a/glsa-200906-01.xml
+++ b/glsa-200906-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-01">
<title>libpng: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>June 27, 2009</announced>
- <revised>June 27, 2009: 01</revised>
+ <announced>2009-06-27</announced>
+ <revised>2009-06-27: 01</revised>
<bug>272970</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.37&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.37"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042">CVE-2009-2042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042">CVE-2009-2042</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2009 18:15:41 +0000">
+ <metadata tag="requester" timestamp="2009-06-21T18:15:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2009 18:23:22 +0000">
+ <metadata tag="submitter" timestamp="2009-06-21T18:23:22Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 Jun 2009 23:12:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-27T23:12:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200906-02.xml b/glsa-200906-02.xml
index 24e6639e..48f43d30 100644
--- a/glsa-200906-02.xml
+++ b/glsa-200906-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-02">
<title>Ruby: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>June 28, 2009</announced>
- <revised>June 28, 2009: 01</revised>
+ <announced>2009-06-28</announced>
+ <revised>2009-06-28: 01</revised>
<bug>273213</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p369&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p369"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904">CVE-2009-1904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904">CVE-2009-1904</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2009 14:29:50 +0000">
+ <metadata tag="submitter" timestamp="2009-06-21T14:29:50Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 Jun 2009 21:32:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-28T21:32:27Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200906-03.xml b/glsa-200906-03.xml
index 5d254348..499bd8e4 100644
--- a/glsa-200906-03.xml
+++ b/glsa-200906-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-03">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Cross-Site Scripting attack.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>June 29, 2009</announced>
- <revised>June 29, 2009: 01</revised>
+ <announced>2009-06-29</announced>
+ <revised>2009-06-29: 01</revised>
<bug>263711</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1150">CVE-2009-1150</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151">CVE-2009-1151</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1150">CVE-2009-1150</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151">CVE-2009-1151</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 27 Jun 2009 20:32:40 +0000">
+ <metadata tag="submitter" timestamp="2009-06-27T20:32:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:35:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:35:56Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200906-04.xml b/glsa-200906-04.xml
index 2fa9ac98..72b5654e 100644
--- a/glsa-200906-04.xml
+++ b/glsa-200906-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-04">
<title>Apache Tomcat JK Connector: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure flaw.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>June 29, 2009</announced>
- <revised>June 29, 2009: 01</revised>
+ <announced>2009-06-29</announced>
+ <revised>2009-06-29: 01</revised>
<bug>265455</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519">CVE-2008-5519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519">CVE-2008-5519</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2009 16:46:40 +0000">
+ <metadata tag="requester" timestamp="2009-06-24T16:46:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Jun 2009 12:27:09 +0000">
+ <metadata tag="submitter" timestamp="2009-06-28T12:27:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:42:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:42:43Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200906-05.xml b/glsa-200906-05.xml
index df890cb6..45c506d4 100644
--- a/glsa-200906-05.xml
+++ b/glsa-200906-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or remote code execution.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 30, 2009</announced>
- <revised>June 30, 2009: 02</revised>
+ <announced>2009-06-30</announced>
+ <revised>2009-06-30: 02</revised>
<bug>242996</bug>
<bug>248425</bug>
<bug>258013</bug>
@@ -123,30 +122,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680">CVE-2008-4680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681">CVE-2008-4681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682">CVE-2008-4682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683">CVE-2008-4683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684">CVE-2008-4684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685">CVE-2008-4685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285">CVE-2008-5285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472">CVE-2008-6472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599">CVE-2009-0599</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600">CVE-2009-0600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601">CVE-2009-0601</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210">CVE-2009-1210</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266">CVE-2009-1266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268">CVE-2009-1268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269">CVE-2009-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829">CVE-2009-1829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680">CVE-2008-4680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681">CVE-2008-4681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682">CVE-2008-4682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683">CVE-2008-4683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684">CVE-2008-4684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685">CVE-2008-4685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285">CVE-2008-5285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472">CVE-2008-6472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599">CVE-2009-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600">CVE-2009-0600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601">CVE-2009-0601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210">CVE-2009-1210</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266">CVE-2009-1266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268">CVE-2009-1268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269">CVE-2009-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829">CVE-2009-1829</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 May 2009 11:33:22 +0000">
+ <metadata tag="submitter" timestamp="2009-05-22T11:33:22Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:09:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:09:27Z">
craig
</metadata>
</glsa>
diff --git a/glsa-200907-01.xml b/glsa-200907-01.xml
index 23ad526d..c733fea9 100644
--- a/glsa-200907-01.xml
+++ b/glsa-200907-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-01">
<title>libwmf: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">libwmf</product>
- <announced>July 02, 2009</announced>
- <revised>July 02, 2009: 01</revised>
+ <announced>2009-07-02</announced>
+ <revised>2009-07-02: 01</revised>
<bug>268161</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libwmf-0.2.8.4-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libwmf-0.2.8.4-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364">CVE-2009-1364</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364">CVE-2009-1364</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 May 2009 17:28:39 +0000">
+ <metadata tag="requester" timestamp="2009-05-22T17:28:39Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 May 2009 00:52:28 +0000">
+ <metadata tag="submitter" timestamp="2009-05-24T00:52:28Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:09:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:09:20Z">
craig
</metadata>
</glsa>
diff --git a/glsa-200907-02.xml b/glsa-200907-02.xml
index f9097683..7dace426 100644
--- a/glsa-200907-02.xml
+++ b/glsa-200907-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-02">
<title>ModSecurity: Denial of Service</title>
<synopsis>
Two vulnerabilities in ModSecurity might lead to a Denial of Service.
</synopsis>
<product type="ebuild">mod_security</product>
- <announced>July 02, 2009</announced>
- <revised>July 02, 2009: 01</revised>
+ <announced>2009-07-02</announced>
+ <revised>2009-07-02: 01</revised>
<bug>262302</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_security-2.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_security-2.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902">CVE-2009-1902</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1903">CVE-2009-1903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902">CVE-2009-1902</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1903">CVE-2009-1903</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:17:27 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:17:27Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Jun 2009 20:29:14 +0000">
+ <metadata tag="submitter" timestamp="2009-06-27T20:29:14Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Jul 2009 11:54:37 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-02T11:54:37Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200907-03.xml b/glsa-200907-03.xml
index e2703089..1ae10b04 100644
--- a/glsa-200907-03.xml
+++ b/glsa-200907-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-03">
<title>APR Utility Library: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
sensitive information.
</synopsis>
<product type="ebuild">apr-util</product>
- <announced>July 04, 2009</announced>
- <revised>July 04, 2009: 01</revised>
+ <announced>2009-07-04</announced>
+ <revised>2009-07-04: 01</revised>
<bug>268643</bug>
<bug>272260</bug>
<bug>274193</bug>
@@ -69,20 +68,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-util-1.3.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-util-1.3.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023">CVE-2009-0023</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955">CVE-2009-1955</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956">CVE-2009-1956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023">CVE-2009-0023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955">CVE-2009-1955</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956">CVE-2009-1956</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Jun 2009 08:48:34 +0000">
+ <metadata tag="requester" timestamp="2009-06-26T08:48:34Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Jun 2009 12:16:58 +0000">
+ <metadata tag="submitter" timestamp="2009-06-28T12:16:58Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Jul 2009 07:45:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-04T07:45:32Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200907-04.xml b/glsa-200907-04.xml
index 6666b61e..213a4342 100644
--- a/glsa-200907-04.xml
+++ b/glsa-200907-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-04">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation, information disclosure or Denial of Service attacks.
</synopsis>
<product type="ebuild">apache</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>268154</bug>
<bug>271470</bug>
<bug>276426</bug>
@@ -74,21 +73,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.11-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.11-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195">CVE-2009-1195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191">CVE-2009-1191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890">CVE-2009-1890</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891">CVE-2009-1891</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195">CVE-2009-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191">CVE-2009-1191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890">CVE-2009-1890</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891">CVE-2009-1891</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Jul 2009 20:22:24 +0000">
+ <metadata tag="requester" timestamp="2009-07-11T20:22:24Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 21:34:40 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T21:34:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jul 2009 15:17:06 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-12T15:17:06Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200907-05.xml b/glsa-200907-05.xml
index e19d88dc..f7527c3e 100644
--- a/glsa-200907-05.xml
+++ b/glsa-200907-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-05">
<title>git: git-daemon Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">git</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>273905</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.6.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.6.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2108">CVE-2009-2108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2108">CVE-2009-2108</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:02:51 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:02:51Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 00:41:19 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T00:41:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 00:41:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T00:41:24Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-06.xml b/glsa-200907-06.xml
index 082d6369..d4f76390 100644
--- a/glsa-200907-06.xml
+++ b/glsa-200907-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-06">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to remote code execution via crafted PDF files.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>267846</bug>
<bug>273908</bug>
<access>remote</access>
@@ -91,33 +90,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198">CVE-2009-0198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509">CVE-2009-0509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510">CVE-2009-0510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511">CVE-2009-0511</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512">CVE-2009-0512</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0888">CVE-2009-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0889">CVE-2009-0889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492">CVE-2009-1492</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493">CVE-2009-1493</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855">CVE-2009-1855</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856">CVE-2009-1856</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857">CVE-2009-1857</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858">CVE-2009-1858</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859">CVE-2009-1859</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861">CVE-2009-1861</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028">CVE-2009-2028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198">CVE-2009-0198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509">CVE-2009-0509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510">CVE-2009-0510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511">CVE-2009-0511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512">CVE-2009-0512</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0888">CVE-2009-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0889">CVE-2009-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492">CVE-2009-1492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493">CVE-2009-1493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855">CVE-2009-1855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856">CVE-2009-1856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857">CVE-2009-1857</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858">CVE-2009-1858</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859">CVE-2009-1859</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861">CVE-2009-1861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028">CVE-2009-2028</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2009 19:11:36 +0000">
+ <metadata tag="requester" timestamp="2009-06-21T19:11:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 17:45:58 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T17:45:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Jul 2009 17:47:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-09T17:47:39Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-07.xml b/glsa-200907-07.xml
index 63ed6a74..333fa009 100644
--- a/glsa-200907-07.xml
+++ b/glsa-200907-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-07">
<title>ModPlug: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">libmodplug gst-plugins-bad</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>266913</bug>
<access>remote</access>
<affected>
@@ -65,7 +64,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libmodplug-0.8.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libmodplug-0.8.7"</code>
<p>
gst-plugins-bad 0.10.11 and later versions do not include the ModPlug
plug-in (it has been moved to media-plugins/gst-plugins-modplug). All
@@ -74,20 +73,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-bad-0.10.11&quot;
- # emerge --ask --verbose &quot;media-plugins/gst-plugins-modplug&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-bad-0.10.11"
+ # emerge --ask --verbose "media-plugins/gst-plugins-modplug"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438">CVE-2009-1438</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513">CVE-2009-1513</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438">CVE-2009-1438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513">CVE-2009-1513</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:45:14 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:45:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 01:50:33 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T01:50:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 01:50:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T01:50:38Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-08.xml b/glsa-200907-08.xml
index c6988d0b..b1bcbffb 100644
--- a/glsa-200907-08.xml
+++ b/glsa-200907-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-08">
<title>Multiple Ralink wireless drivers: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">rt2400 rt2500 rt2570 rt61 ralink-rt61</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>257023</bug>
<access>remote</access>
<affected>
@@ -63,22 +62,22 @@
stable versions of sys-kernel/gentoo-sources.
</p>
<code>
- # emerge --unmerge &quot;net-wireless/rt2400&quot;
- # emerge --unmerge &quot;net-wireless/rt2500&quot;
- # emerge --unmerge &quot;net-wireless/rt2570&quot;
- # emerge --unmerge &quot;net-wireless/rt61&quot;
- # emerge --unmerge &quot;net-wireless/ralink-rt61&quot;</code>
+ # emerge --unmerge "net-wireless/rt2400"
+ # emerge --unmerge "net-wireless/rt2500"
+ # emerge --unmerge "net-wireless/rt2570"
+ # emerge --unmerge "net-wireless/rt61"
+ # emerge --unmerge "net-wireless/ralink-rt61"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 18:18:38 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T18:18:38Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 18:30:24 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T18:30:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jul 2009 15:41:07 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-12T15:41:07Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-09.xml b/glsa-200907-09.xml
index 28d22b7b..993ed6df 100644
--- a/glsa-200907-09.xml
+++ b/glsa-200907-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-09">
<title>Cyrus-SASL: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code in applications or daemons that authenticate using SASL.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>270261</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/cyrus-sasl-2.1.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/cyrus-sasl-2.1.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688">CVE-2009-0688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688">CVE-2009-0688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 18:32:29 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T18:32:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 21:10:28 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T21:10:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jul 2009 10:41:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-10T10:41:22Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-10.xml b/glsa-200907-10.xml
index b1892d29..4d5d3aec 100644
--- a/glsa-200907-10.xml
+++ b/glsa-200907-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-10">
<title>Syslog-ng: Chroot escape</title>
<synopsis>
@@ -8,8 +7,8 @@
escape if a separate vulnerability in Syslog-ng is exploited.
</synopsis>
<product type="ebuild">syslog-ng</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>247278</bug>
<access>local</access>
<affected>
@@ -48,24 +47,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.0.10"</code>
<p>
All Syslog-ng 2.1 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110">CVE-2008-5110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110">CVE-2008-5110</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 11:11:22 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T11:11:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2009 11:21:31 +0000">
+ <metadata tag="submitter" timestamp="2009-07-10T11:21:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jul 2009 11:21:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-10T11:21:44Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-11.xml b/glsa-200907-11.xml
index 51ada9ed..0e34d45a 100644
--- a/glsa-200907-11.xml
+++ b/glsa-200907-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-11">
<title>GStreamer plug-ins: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gst-plugins-good gst-plugins-base gst-plugins-libpng</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>256096</bug>
<bug>261594</bug>
<bug>272972</bug>
@@ -77,34 +76,34 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-good-0.10.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-good-0.10.14"</code>
<p>
All gst-plugins-base users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-base-0.10.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-base-0.10.22"</code>
<p>
All gst-plugins-libpng users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-libpng-0.10.14-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-libpng-0.10.14-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386">CVE-2009-0386</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387">CVE-2009-0387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397">CVE-2009-0397</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586">CVE-2009-0586</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932">CVE-2009-1932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386">CVE-2009-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387">CVE-2009-0387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397">CVE-2009-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586">CVE-2009-0586</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932">CVE-2009-1932</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:44:55 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:44:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 01:19:25 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T01:19:25Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 01:21:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T01:21:49Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-12.xml b/glsa-200907-12.xml
index 6b28c8a2..24d66982 100644
--- a/glsa-200907-12.xml
+++ b/glsa-200907-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-12">
<title>ISC DHCP: dhcpclient Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
allows for the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>July 14, 2009</announced>
- <revised>July 14, 2009: 01</revised>
+ <announced>2009-07-14</announced>
+ <revised>2009-07-14: 01</revised>
<bug>277729</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692">CVE-2009-0692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692">CVE-2009-0692</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Jul 2009 14:21:43 +0000">
+ <metadata tag="requester" timestamp="2009-07-12T14:21:43Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Jul 2009 14:58:48 +0000">
+ <metadata tag="submitter" timestamp="2009-07-12T14:58:48Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Jul 2009 17:38:51 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-14T17:38:51Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200907-13.xml b/glsa-200907-13.xml
index 89ef20a8..23d60513 100644
--- a/glsa-200907-13.xml
+++ b/glsa-200907-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-13">
<title>PulseAudio: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>July 16, 2009</announced>
- <revised>July 16, 2009: 01</revised>
+ <announced>2009-07-16</announced>
+ <revised>2009-07-16: 01</revised>
<bug>276986</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/pulseaudio-0.9.9-r54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/pulseaudio-0.9.9-r54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894">CVE-2009-1894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894">CVE-2009-1894</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 16:33:42 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T16:33:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 16:51:52 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T16:51:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Jul 2009 14:13:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-16T14:13:15Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-14.xml b/glsa-200907-14.xml
index ed302b99..281fe214 100644
--- a/glsa-200907-14.xml
+++ b/glsa-200907-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-14">
<title>Rasterbar libtorrent: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker to overwrite arbitrary files.
</synopsis>
<product type="ebuild">rb_libtorrent deluge</product>
- <announced>July 17, 2009</announced>
- <revised>July 17, 2009: 01</revised>
+ <announced>2009-07-17</announced>
+ <revised>2009-07-17: 01</revised>
<bug>273156</bug>
<bug>273961</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/rb_libtorrent-0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/rb_libtorrent-0.13-r1"</code>
<p>
All Deluge users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/deluge-1.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/deluge-1.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1760">CVE-2009-1760</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1760">CVE-2009-1760</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 10:55:00 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T10:55:00Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 02:02:27 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T02:02:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jul 2009 06:51:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-17T06:51:09Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-15.xml b/glsa-200907-15.xml
index 97ad8a48..9e3ef75b 100644
--- a/glsa-200907-15.xml
+++ b/glsa-200907-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-15">
<title>Nagios: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">nagios-core</product>
- <announced>July 19, 2009</announced>
- <revised>July 19, 2009: 01</revised>
+ <announced>2009-07-19</announced>
+ <revised>2009-07-19: 01</revised>
<bug>245887</bug>
<bug>249876</bug>
<bug>275288</bug>
@@ -68,7 +67,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-core-3.0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-core-3.0.6-r2"</code>
<p>
NOTE: Users of the Nagios 2 branch can update to version 2.12-r1 which
contains a patch to fix CVE-2009-2288. However, that branch is not
@@ -77,18 +76,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027">CVE-2008-5027</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5028">CVE-2008-5028</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6373">CVE-2008-6373</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288">CVE-2009-2288</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027">CVE-2008-5027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5028">CVE-2008-5028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6373">CVE-2008-6373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288">CVE-2009-2288</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:14:06 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:14:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jul 2009 15:48:17 +0000">
+ <metadata tag="submitter" timestamp="2009-07-19T15:48:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jul 2009 15:48:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-19T15:48:53Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200907-16.xml b/glsa-200907-16.xml
index 9f0cb783..0727d805 100644
--- a/glsa-200907-16.xml
+++ b/glsa-200907-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-16">
<title>Python: Integer overflows</title>
<synopsis>
Multiple integer overflows in Python have an unspecified impact.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 19, 2009</announced>
- <revised>July 19, 2009: 01</revised>
+ <announced>2009-07-19</announced>
+ <revised>2009-07-19: 01</revised>
<bug>246991</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.5.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.5.4-r2"</code>
<p>
All Python 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031">CVE-2008-5031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031">CVE-2008-5031</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:26:22 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:26:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jul 2009 15:28:36 +0000">
+ <metadata tag="submitter" timestamp="2009-07-19T15:28:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jul 2009 15:28:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-19T15:28:41Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200908-01.xml b/glsa-200908-01.xml
index 9be8336c..217074c3 100644
--- a/glsa-200908-01.xml
+++ b/glsa-200908-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-01">
<title>OpenSC: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in OpenSC.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>August 01, 2009</announced>
- <revised>August 01, 2009: 01</revised>
+ <announced>2009-08-01</announced>
+ <revised>2009-08-01: 01</revised>
<bug>260514</bug>
<bug>269920</bug>
<access>local</access>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/opensc-0.11.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/opensc-0.11.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368">CVE-2009-0368</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1603">CVE-2009-1603</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368">CVE-2009-0368</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1603">CVE-2009-1603</uri>
<uri link="http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html">OpenSC Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2009 16:49:20 +0000">
+ <metadata tag="requester" timestamp="2009-06-24T16:49:20Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jul 2009 17:15:19 +0000">
+ <metadata tag="submitter" timestamp="2009-07-29T17:15:19Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Aug 2009 12:35:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-01T12:35:17Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200908-02.xml b/glsa-200908-02.xml
index 4884c598..20686adb 100644
--- a/glsa-200908-02.xml
+++ b/glsa-200908-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-02">
<title>BIND: Denial of Service</title>
<synopsis>
Dynamic Update packets can cause a Denial of Service in the BIND daemon.
</synopsis>
<product type="ebuild">bind</product>
- <announced>August 01, 2009</announced>
- <revised>August 01, 2009: 01</revised>
+ <announced>2009-08-01</announced>
+ <revised>2009-08-01: 01</revised>
<bug>279508</bug>
<access>remote</access>
<affected>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</uri>
<uri link="https://www.isc.org/node/474">ISC advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 28 Jul 2009 21:43:47 +0000">
+ <metadata tag="submitter" timestamp="2009-07-28T21:43:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Aug 2009 20:00:21 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-01T20:00:21Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-03.xml b/glsa-200908-03.xml
index 550b1698..444ec3c9 100644
--- a/glsa-200908-03.xml
+++ b/glsa-200908-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-03">
<title>libTIFF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>August 07, 2009</announced>
- <revised>August 07, 2009: 01</revised>
+ <announced>2009-08-07</announced>
+ <revised>2009-08-07: 01</revised>
<bug>276339</bug>
<bug>276988</bug>
<access>remote</access>
@@ -60,19 +59,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285">CVE-2009-2285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347">CVE-2009-2347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285">CVE-2009-2285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347">CVE-2009-2347</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 08:33:26 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T08:33:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 02:17:53 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T02:17:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:20:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:20:56Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-04.xml b/glsa-200908-04.xml
index 5c97cfba..f067525e 100644
--- a/glsa-200908-04.xml
+++ b/glsa-200908-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-04">
<title>Adobe products: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks including the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash acroread</product>
- <announced>August 07, 2009</announced>
- <revised>August 07, 2009: 01</revised>
+ <announced>2009-08-07</announced>
+ <revised>2009-08-07: 01</revised>
<bug>278813</bug>
<bug>278819</bug>
<access>remote</access>
@@ -82,32 +81,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.32.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.32.18"</code>
<p>
All Adobe Reader users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862">CVE-2009-1862</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863">CVE-2009-1863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864">CVE-2009-1864</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865">CVE-2009-1865</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866">CVE-2009-1866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867">CVE-2009-1867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868">CVE-2009-1868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869">CVE-2009-1869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870">CVE-2009-1870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862">CVE-2009-1862</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863">CVE-2009-1863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864">CVE-2009-1864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865">CVE-2009-1865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866">CVE-2009-1866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867">CVE-2009-1867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868">CVE-2009-1868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869">CVE-2009-1869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870">CVE-2009-1870</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Aug 2009 14:34:28 +0000">
+ <metadata tag="requester" timestamp="2009-08-01T14:34:28Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Aug 2009 13:16:39 +0000">
+ <metadata tag="submitter" timestamp="2009-08-05T13:16:39Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:24Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-05.xml b/glsa-200908-05.xml
index 15c8b1b1..3bf8561e 100644
--- a/glsa-200908-05.xml
+++ b/glsa-200908-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-05">
<title>Subversion: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>280494</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/subversion-1.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/subversion-1.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411">CVE-2009-2411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411">CVE-2009-2411</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 20:48:04 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T20:48:04Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Aug 2009 19:08:11 +0000">
+ <metadata tag="submitter" timestamp="2009-08-18T19:08:11Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Aug 2009 21:24:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-18T21:24:46Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-06.xml b/glsa-200908-06.xml
index 66f58531..2e67779a 100644
--- a/glsa-200908-06.xml
+++ b/glsa-200908-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-06">
<title>CDF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">cdf</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>278679</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-libs/cdf-3.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-libs/cdf-3.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2850">CVE-2009-2850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2850">CVE-2009-2850</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 15:21:56 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T15:21:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 16:20:48 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T16:20:48Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Aug 2009 21:24:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-18T21:24:15Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-07.xml b/glsa-200908-07.xml
index 7824f4eb..ed6fc59c 100644
--- a/glsa-200908-07.xml
+++ b/glsa-200908-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-07">
<title>Perl Compress::Raw modules: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service.
</synopsis>
<product type="ebuild">Compress-Raw-Zlib Compress-Raw-Bzip2</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>273141</bug>
<bug>281955</bug>
<access>remote</access>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Raw-Zlib-2.020&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Raw-Zlib-2.020"</code>
<p>
All Compress::Raw::Bzip2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Raw-Bzip2-2.020&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Raw-Bzip2-2.020"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391">CVE-2009-1391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1884">CVE-2009-1884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391">CVE-2009-1391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1884">CVE-2009-1884</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 17:33:05 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T17:33:05Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 18:43:38 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T18:43:38Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:50 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:50Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-08.xml b/glsa-200908-08.xml
index be457f7b..b3e74808 100644
--- a/glsa-200908-08.xml
+++ b/glsa-200908-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-08">
<title>ISC DHCP: dhcpd Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
special conditions, leading to a Denial of Service.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>275231</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.2_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.2_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892">CVE-2009-1892</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892">CVE-2009-1892</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 17:01:31 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T17:01:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:40:02 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:40:02Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:31Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-09.xml b/glsa-200908-09.xml
index efac1855..a6bda491 100644
--- a/glsa-200908-09.xml
+++ b/glsa-200908-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-09">
<title>DokuWiki: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
files or even the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>August 18, 2009</announced>
- <revised>August 19, 2009: 02</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-19: 02</revised>
<bug>272431</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-2009-02-14b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-2009-02-14b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960">CVE-2009-1960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960">CVE-2009-1960</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 18:47:33 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T18:47:33Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:07:45 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:07:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:43Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200908-10.xml b/glsa-200908-10.xml
index c873822e..e3207644 100644
--- a/glsa-200908-10.xml
+++ b/glsa-200908-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-10">
<title>Dillo: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">dillo</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>276432</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/dillo-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/dillo-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2294">CVE-2009-2294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2294">CVE-2009-2294</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 16:58:47 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T16:58:47Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:13:24 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:13:24Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:35Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-01.xml b/glsa-200909-01.xml
index f8062565..a485acf3 100644
--- a/glsa-200909-01.xml
+++ b/glsa-200909-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-01">
<title>Linux-PAM: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to cause a Denial of Service or escalate privileges.
</synopsis>
<product type="ebuild">pam</product>
- <announced>September 07, 2009</announced>
- <revised>September 07, 2009: 01</revised>
+ <announced>2009-09-07</announced>
+ <revised>2009-09-07: 01</revised>
<bug>261512</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/pam-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/pam-1.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0887">CVE-2009-0887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0887">CVE-2009-0887</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:01:34 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:01:34Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 16:33:27 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T16:33:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:46Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-02.xml b/glsa-200909-02.xml
index b85a37b6..a5a869ef 100644
--- a/glsa-200909-02.xml
+++ b/glsa-200909-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-02">
<title>libvorbis: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>September 07, 2009</announced>
- <revised>September 07, 2009: 01</revised>
+ <announced>2009-09-07</announced>
+ <revised>2009-09-07: 01</revised>
<bug>280590</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663">CVE-2009-2663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663">CVE-2009-2663</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:17:32 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:17:32Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Aug 2009 02:42:12 +0000">
+ <metadata tag="submitter" timestamp="2009-08-31T02:42:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:56Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-03.xml b/glsa-200909-03.xml
index bb3d37e9..ac569d01 100644
--- a/glsa-200909-03.xml
+++ b/glsa-200909-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-03">
<title>Apache Portable Runtime, APR Utility Library: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Library might allow for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">apr apr-util</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>280514</bug>
<access>remote</access>
<affected>
@@ -58,24 +57,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-1.3.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-1.3.8"</code>
<p>
All APR Utility Library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-util-1.3.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-util-1.3.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412">CVE-2009-2412</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412">CVE-2009-2412</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Aug 2009 13:32:21 +0000">
+ <metadata tag="requester" timestamp="2009-08-06T13:32:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Aug 2009 13:46:29 +0000">
+ <metadata tag="submitter" timestamp="2009-08-06T13:46:29Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Aug 2009 20:40:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-24T20:40:13Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-04.xml b/glsa-200909-04.xml
index 29901348..81f990aa 100644
--- a/glsa-200909-04.xml
+++ b/glsa-200909-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-04">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>264834</bug>
<bug>265545</bug>
<access>remote</access>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.95.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.95.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680">CVE-2008-6680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270">CVE-2009-1270</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371">CVE-2009-1371</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372">CVE-2009-1372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680">CVE-2008-6680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270">CVE-2009-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371">CVE-2009-1371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372">CVE-2009-1372</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 Jun 2009 22:30:28 +0000">
+ <metadata tag="requester" timestamp="2009-06-01T22:30:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 09:13:38 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T09:13:38Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:38Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-05.xml b/glsa-200909-05.xml
index 82c8bf26..56062c2b 100644
--- a/glsa-200909-05.xml
+++ b/glsa-200909-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-05">
<title>Openswan: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>264346</bug>
<bug>275233</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790">CVE-2009-0790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185">CVE-2009-2185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790">CVE-2009-0790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185">CVE-2009-2185</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:25:11 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:25:11Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 16:52:25 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T16:52:25Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:39:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:39:02Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-06.xml b/glsa-200909-06.xml
index 9d85bdb4..5e76876e 100644
--- a/glsa-200909-06.xml
+++ b/glsa-200909-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-06">
<title>aMule: Parameter injection</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary parameters to a victim's media player.
</synopsis>
<product type="ebuild">amule</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>268163</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/amule-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/amule-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1440">CVE-2009-1440</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1440">CVE-2009-1440</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 16:58:04 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T16:58:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:22:54 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:22:54Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:32Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-07.xml b/glsa-200909-07.xml
index f45cfe1f..db0ada08 100644
--- a/glsa-200909-07.xml
+++ b/glsa-200909-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-07">
<title>TkMan: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">tkman</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>247540</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tkman-2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tkman-2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5137">CVE-2008-5137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5137">CVE-2008-5137</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 18:23:29 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T18:23:29Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:32:36 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:32:36Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:41Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-08.xml b/glsa-200909-08.xml
index dc3f4a86..295ac365 100644
--- a/glsa-200909-08.xml
+++ b/glsa-200909-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-08">
<title>C* music player: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for symlink attacks.
</synopsis>
<product type="ebuild">cmus</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>250474</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/cmus-2.2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/cmus-2.2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5375">CVE-2008-5375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5375">CVE-2008-5375</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Jun 2009 20:29:45 +0000">
+ <metadata tag="requester" timestamp="2009-06-23T20:29:45Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:44:23 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:44:23Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:47Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-09.xml b/glsa-200909-09.xml
index 74310cdd..13b658e5 100644
--- a/glsa-200909-09.xml
+++ b/glsa-200909-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-09">
<title>Screenie: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
for symlink attacks.
</synopsis>
<product type="ebuild">screenie</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>250476</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/screenie-1.30.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/screenie-1.30.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5371">CVE-2008-5371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5371">CVE-2008-5371</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:09:23 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:09:23Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:52:34 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:52:34Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:54Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-10.xml b/glsa-200909-10.xml
index 4d2ed89d..66b1b1ea 100644
--- a/glsa-200909-10.xml
+++ b/glsa-200909-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-10">
<title>LMBench: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
LMBench, allowing for symlink attacks.
</synopsis>
<product type="ebuild">lmbench</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>246015</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
# emerge --unmerge app-benchmarks/lmbench</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4968">CVE-2008-4968</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4968">CVE-2008-4968</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 10:54:15 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T10:54:15Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:58:27 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:58:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:05Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-11.xml b/glsa-200909-11.xml
index a97f216b..deeae322 100644
--- a/glsa-200909-11.xml
+++ b/glsa-200909-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-11">
<title>GCC-XML: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">gccxml</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>245765</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-cpp/gccxml-0.9.0_pre20090516&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-cpp/gccxml-0.9.0_pre20090516"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4957">CVE-2008-4957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4957">CVE-2008-4957</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 May 2009 20:39:27 +0000">
+ <metadata tag="requester" timestamp="2009-05-25T20:39:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:04:45 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:04:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:17Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-12.xml b/glsa-200909-12.xml
index c0cf495b..58937d7c 100644
--- a/glsa-200909-12.xml
+++ b/glsa-200909-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-12">
<title>HTMLDOC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">htmldoc</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>278186</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/htmldoc-1.8.27-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/htmldoc-1.8.27-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050">CVE-2009-3050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050">CVE-2009-3050</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Aug 2009 18:35:26 +0000">
+ <metadata tag="requester" timestamp="2009-08-26T18:35:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Aug 2009 18:45:17 +0000">
+ <metadata tag="submitter" timestamp="2009-08-26T18:45:17Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Sep 2009 09:53:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-06T09:53:24Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-13.xml b/glsa-200909-13.xml
index 453b7399..acbdc8ee 100644
--- a/glsa-200909-13.xml
+++ b/glsa-200909-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-13">
<title>irssi: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
found in irssi which might result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">irssi</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>271875</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/irssi-0.8.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/irssi-0.8.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959">CVE-2009-1959</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959">CVE-2009-1959</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Jun 2009 19:45:21 +0000">
+ <metadata tag="requester" timestamp="2009-06-10T19:45:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Jul 2009 19:15:53 +0000">
+ <metadata tag="submitter" timestamp="2009-07-02T19:15:53Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Sep 2009 16:10:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-12T16:10:35Z">
craig
</metadata>
</glsa>
diff --git a/glsa-200909-14.xml b/glsa-200909-14.xml
index 6c79d9fc..7422ce6b 100644
--- a/glsa-200909-14.xml
+++ b/glsa-200909-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-14">
<title>Horde: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Cross-Site Scripting.
</synopsis>
<product type="ebuild">horde horde-imp horde-passwd</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>256125</bug>
<bug>262976</bug>
<bug>262978</bug>
@@ -83,31 +82,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.3.4"</code>
<p>
All Horde IMP users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-4.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-4.3.4"</code>
<p>
All Horde Passwd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-passwd-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-passwd-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5917">CVE-2008-5917</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0930">CVE-2009-0930</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0931">CVE-2009-0931</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0932">CVE-2009-0932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2360">CVE-2009-2360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5917">CVE-2008-5917</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0930">CVE-2009-0930</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0931">CVE-2009-0931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0932">CVE-2009-0932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2360">CVE-2009-2360</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 02 Sep 2009 04:40:46 +0000">
+ <metadata tag="submitter" timestamp="2009-09-02T04:40:46Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Sep 2009 04:40:52 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-02T04:40:52Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-15.xml b/glsa-200909-15.xml
index ec7ca167..4198eaac 100644
--- a/glsa-200909-15.xml
+++ b/glsa-200909-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-15">
<title>Lynx: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary commands.
</synopsis>
<product type="ebuild">lynx</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>243058</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690">CVE-2008-4690</uri>
- <uri link="/security/en/glsa/glsa-200511-09.xml">GLSA 200511-09</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690">CVE-2008-4690</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200511-09.xml">GLSA 200511-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Aug 2009 11:47:31 +0000">
+ <metadata tag="requester" timestamp="2009-08-07T11:47:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:16:43 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:16:43Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:19 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:19Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-16.xml b/glsa-200909-16.xml
index c0532705..ceb3d25f 100644
--- a/glsa-200909-16.xml
+++ b/glsa-200909-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-16">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 13, 2009</announced>
- <revised>September 13, 2009: 01</revised>
+ <announced>2009-09-13</announced>
+ <revised>2009-09-13: 01</revised>
<bug>278564</bug>
<access>remote</access>
<affected>
@@ -61,22 +60,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2559">CVE-2009-2559</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561">CVE-2009-2561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562">CVE-2009-2562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563">CVE-2009-2563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2559">CVE-2009-2559</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561">CVE-2009-2561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562">CVE-2009-2562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563">CVE-2009-2563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Aug 2009 10:03:54 +0000">
+ <metadata tag="requester" timestamp="2009-08-25T10:03:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Aug 2009 13:10:41 +0000">
+ <metadata tag="submitter" timestamp="2009-08-25T13:10:41Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Aug 2009 13:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-25T13:28:12Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200909-17.xml b/glsa-200909-17.xml
index 97e06251..6ccb1219 100644
--- a/glsa-200909-17.xml
+++ b/glsa-200909-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-17">
<title>ZNC: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">znc</product>
- <announced>September 13, 2009</announced>
- <revised>September 13, 2009: 01</revised>
+ <announced>2009-09-13</announced>
+ <revised>2009-09-13: 01</revised>
<bug>278684</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/znc-0.074&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/znc-0.074"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2658">CVE-2009-2658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2658">CVE-2009-2658</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Aug 2009 18:19:47 +0000">
+ <metadata tag="requester" timestamp="2009-08-14T18:19:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 18:28:31 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T18:28:31Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 08:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T08:50:23Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200909-18.xml b/glsa-200909-18.xml
index bee7433a..5e227c42 100644
--- a/glsa-200909-18.xml
+++ b/glsa-200909-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-18">
<title>nginx: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
of Service.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>September 18, 2009</announced>
- <revised>September 18, 2009: 01</revised>
+ <announced>2009-09-18</announced>
+ <revised>2009-09-18: 01</revised>
<bug>285162</bug>
<access>remote</access>
<affected>
@@ -53,30 +52,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.5.38&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.5.38"</code>
<p>
All nginx 0.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.6.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.6.39"</code>
<p>
All nginx 0.7.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.7.62&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.7.62"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2629">CVE-2009-2629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2629">CVE-2009-2629</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Sep 2009 19:21:09 +0000">
+ <metadata tag="requester" timestamp="2009-09-14T19:21:09Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Sep 2009 19:51:52 +0000">
+ <metadata tag="submitter" timestamp="2009-09-14T19:51:52Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Sep 2009 19:40:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-18T19:40:49Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-19.xml b/glsa-200909-19.xml
index 0e8e82c9..d9f1d800 100644
--- a/glsa-200909-19.xml
+++ b/glsa-200909-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-19">
<title>Dnsmasq: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code, or a Denial of Service.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>September 20, 2009</announced>
- <revised>September 20, 2009: 01</revised>
+ <announced>2009-09-20</announced>
+ <revised>2009-09-20: 01</revised>
<bug>282653</bug>
<access>remote</access>
<affected>
@@ -61,16 +60,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957">CVE-2009-2957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958">CVE-2009-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957">CVE-2009-2957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958">CVE-2009-2958</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 01 Sep 2009 10:28:12 +0000">
+ <metadata tag="submitter" timestamp="2009-09-01T10:28:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Sep 2009 18:56:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-20T18:56:49Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200909-20.xml b/glsa-200909-20.xml
index b3fedc8c..37e93dae 100644
--- a/glsa-200909-20.xml
+++ b/glsa-200909-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-20">
<title>cURL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">curl</product>
- <announced>September 25, 2009</announced>
- <revised>September 25, 2009: 01</revised>
+ <announced>2009-09-25</announced>
+ <revised>2009-09-25: 01</revised>
<bug>281515</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.19.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.19.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417">CVE-2009-2417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417">CVE-2009-2417</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Sep 2009 18:08:24 +0000">
+ <metadata tag="requester" timestamp="2009-09-13T18:08:24Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Sep 2009 12:08:01 +0000">
+ <metadata tag="submitter" timestamp="2009-09-14T12:08:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Sep 2009 18:22:08 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-25T18:22:08Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200910-01.xml b/glsa-200910-01.xml
index 4b2010af..135420ac 100644
--- a/glsa-200910-01.xml
+++ b/glsa-200910-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-01">
<title>Wget: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">wget</product>
- <announced>October 20, 2009</announced>
- <revised>October 20, 2009: 01</revised>
+ <announced>2009-10-20</announced>
+ <revised>2009-10-20: 01</revised>
<bug>286058</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/wget-1.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/wget-1.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490">CVE-2009-3490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490">CVE-2009-3490</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Oct 2009 19:10:37 +0000">
+ <metadata tag="requester" timestamp="2009-10-07T19:10:37Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Oct 2009 19:14:43 +0000">
+ <metadata tag="submitter" timestamp="2009-10-07T19:14:43Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Oct 2009 19:38:52 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-20T19:38:52Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200910-02.xml b/glsa-200910-02.xml
index d901ff1f..88915d99 100644
--- a/glsa-200910-02.xml
+++ b/glsa-200910-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-02">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>October 22, 2009</announced>
- <revised>October 22, 2009: 01</revised>
+ <announced>2009-10-22</announced>
+ <revised>2009-10-22: 01</revised>
<bug>276000</bug>
<bug>281545</bug>
<bug>283324</bug>
@@ -69,22 +68,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889">CVE-2009-1889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694">CVE-2009-2694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026">CVE-2009-3026</uri>
- <uri link="/security/en/glsa/glsa-200905-07.xml">GLSA 200905-07</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889">CVE-2009-1889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694">CVE-2009-2694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026">CVE-2009-3026</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200905-07.xml">GLSA 200905-07</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:16:12 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:16:12Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Aug 2009 07:10:07 +0000">
+ <metadata tag="submitter" timestamp="2009-08-31T07:10:07Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 Oct 2009 19:06:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-22T19:06:35Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-200910-03.xml b/glsa-200910-03.xml
index f3e31955..f45671ba 100644
--- a/glsa-200910-03.xml
+++ b/glsa-200910-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-03">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code, or other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>October 25, 2009</announced>
- <revised>October 25, 2009: 01</revised>
+ <announced>2009-10-25</announced>
+ <revised>2009-10-25: 01</revised>
<bug>289016</bug>
<access>remote</access>
<affected>
@@ -51,39 +50,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.2"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb09-15.html">APSB09-15</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979">CVE-2009-2979</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980">CVE-2009-2980</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981">CVE-2009-2981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982">CVE-2009-2982</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983">CVE-2009-2983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985">CVE-2009-2985</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986">CVE-2009-2986</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988">CVE-2009-2988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990">CVE-2009-2990</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991">CVE-2009-2991</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993">CVE-2009-2993</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994">CVE-2009-2994</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996">CVE-2009-2996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997">CVE-2009-2997</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998">CVE-2009-2998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431">CVE-2009-3431</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458">CVE-2009-3458</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459">CVE-2009-3459</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462">CVE-2009-3462</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb09-15.html">APSB09-15</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979">CVE-2009-2979</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980">CVE-2009-2980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981">CVE-2009-2981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982">CVE-2009-2982</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983">CVE-2009-2983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985">CVE-2009-2985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986">CVE-2009-2986</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988">CVE-2009-2988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990">CVE-2009-2990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991">CVE-2009-2991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993">CVE-2009-2993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994">CVE-2009-2994</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996">CVE-2009-2996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997">CVE-2009-2997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998">CVE-2009-2998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431">CVE-2009-3431</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458">CVE-2009-3458</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459">CVE-2009-3459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462">CVE-2009-3462</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Oct 2009 18:48:21 +0000">
+ <metadata tag="requester" timestamp="2009-10-24T18:48:21Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Oct 2009 23:09:06 +0000">
+ <metadata tag="submitter" timestamp="2009-10-24T23:09:06Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 24 Oct 2009 23:09:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-24T23:09:17Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200911-01.xml b/glsa-200911-01.xml
index 5c5056b9..cf59ec92 100644
--- a/glsa-200911-01.xml
+++ b/glsa-200911-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-01">
<title>Horde: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files to be overwritten and cross-site scripting attacks.
</synopsis>
<product type="ebuild">horde horde-webmail horde-groupware</product>
- <announced>November 06, 2009</announced>
- <revised>November 06, 2009: 01</revised>
+ <announced>2009-11-06</announced>
+ <revised>2009-11-06: 01</revised>
<bug>285052</bug>
<access>remote</access>
<affected>
@@ -64,31 +63,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.3.5"</code>
<p>
All Horde webmail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-webmail-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-webmail-1.2.4"</code>
<p>
All Horde groupware users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-groupware-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-groupware-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3236">CVE-2009-3236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3237">CVE-2009-3237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3236">CVE-2009-3236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3237">CVE-2009-3237</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Oct 2009 19:14:03 +0000">
+ <metadata tag="requester" timestamp="2009-10-20T19:14:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Oct 2009 17:35:14 +0000">
+ <metadata tag="submitter" timestamp="2009-10-28T17:35:14Z">
chainsaw
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Nov 2009 12:02:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-06T12:02:09Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200911-02.xml b/glsa-200911-02.xml
index b48ddf25..fe5bebf1 100644
--- a/glsa-200911-02.xml
+++ b/glsa-200911-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-02">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
including the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java blackdown-jre blackdown-jdk</product>
- <announced>November 17, 2009</announced>
- <revised>November 17, 2009: 01</revised>
+ <announced>2009-11-17</announced>
+ <revised>2009-11-17: 01</revised>
<bug>182824</bug>
<bug>231337</bug>
<bug>250012</bug>
@@ -85,39 +84,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.22"</code>
<p>
All Sun JRE 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.17"</code>
<p>
All Sun JDK 1.5.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.22"</code>
<p>
All Sun JDK 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.17"</code>
<p>
All users of the precompiled 32bit Sun JRE 1.5.x should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.22"</code>
<p>
All users of the precompiled 32bit Sun JRE 1.6.x should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.17"</code>
<p>
All Sun JRE 1.4.x, Sun JDK 1.4.x, Blackdown JRE, Blackdown JDK and
precompiled 32bit Sun JRE 1.4.x users are strongly advised to unmerge
@@ -136,103 +135,103 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086">CVE-2008-2086</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103">CVE-2008-3103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104">CVE-2008-3104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105">CVE-2008-3105</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106">CVE-2008-3106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107">CVE-2008-3107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108">CVE-2008-3108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3109">CVE-2008-3109</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3110">CVE-2008-3110</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111">CVE-2008-3111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112">CVE-2008-3112</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113">CVE-2008-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114">CVE-2008-3114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115">CVE-2008-3115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339">CVE-2008-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340">CVE-2008-5340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341">CVE-2008-5341</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342">CVE-2008-5342</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343">CVE-2008-5343</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344">CVE-2008-5344</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345">CVE-2008-5345</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346">CVE-2008-5346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347">CVE-2008-5347</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348">CVE-2008-5348</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349">CVE-2008-5349</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350">CVE-2008-5350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351">CVE-2008-5351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352">CVE-2008-5352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353">CVE-2008-5353</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354">CVE-2008-5354</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355">CVE-2008-5355</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356">CVE-2008-5356</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357">CVE-2008-5357</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358">CVE-2008-5358</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359">CVE-2008-5359</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360">CVE-2008-5360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093">CVE-2009-1093</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094">CVE-2009-1094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095">CVE-2009-1095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096">CVE-2009-1096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097">CVE-2009-1097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098">CVE-2009-1098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099">CVE-2009-1099</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100">CVE-2009-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101">CVE-2009-1101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102">CVE-2009-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103">CVE-2009-1103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104">CVE-2009-1104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105">CVE-2009-1105</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106">CVE-2009-1106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107">CVE-2009-1107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475">CVE-2009-2475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476">CVE-2009-2476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670">CVE-2009-2670</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671">CVE-2009-2671</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672">CVE-2009-2672</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673">CVE-2009-2673</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674">CVE-2009-2674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675">CVE-2009-2675</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676">CVE-2009-2676</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689">CVE-2009-2689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690">CVE-2009-2690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716">CVE-2009-2716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718">CVE-2009-2718</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719">CVE-2009-2719</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720">CVE-2009-2720</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721">CVE-2009-2721</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722">CVE-2009-2722</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723">CVE-2009-2723</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724">CVE-2009-2724</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3728">CVE-2009-3728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3729">CVE-2009-3729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865">CVE-2009-3865</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866">CVE-2009-3866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867">CVE-2009-3867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868">CVE-2009-3868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869">CVE-2009-3869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871">CVE-2009-3871</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872">CVE-2009-3872</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873">CVE-2009-3873</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874">CVE-2009-3874</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875">CVE-2009-3875</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876">CVE-2009-3876</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877">CVE-2009-3877</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3879">CVE-2009-3879</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3880">CVE-2009-3880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3881">CVE-2009-3881</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3882">CVE-2009-3882</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3883">CVE-2009-3883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3884">CVE-2009-3884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3886">CVE-2009-3886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086">CVE-2008-2086</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103">CVE-2008-3103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104">CVE-2008-3104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105">CVE-2008-3105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106">CVE-2008-3106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107">CVE-2008-3107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108">CVE-2008-3108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3109">CVE-2008-3109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3110">CVE-2008-3110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111">CVE-2008-3111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112">CVE-2008-3112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113">CVE-2008-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114">CVE-2008-3114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115">CVE-2008-3115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339">CVE-2008-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340">CVE-2008-5340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341">CVE-2008-5341</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342">CVE-2008-5342</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343">CVE-2008-5343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344">CVE-2008-5344</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345">CVE-2008-5345</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346">CVE-2008-5346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347">CVE-2008-5347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348">CVE-2008-5348</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349">CVE-2008-5349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350">CVE-2008-5350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351">CVE-2008-5351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352">CVE-2008-5352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353">CVE-2008-5353</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354">CVE-2008-5354</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355">CVE-2008-5355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356">CVE-2008-5356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357">CVE-2008-5357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358">CVE-2008-5358</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359">CVE-2008-5359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360">CVE-2008-5360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093">CVE-2009-1093</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094">CVE-2009-1094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095">CVE-2009-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096">CVE-2009-1096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097">CVE-2009-1097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098">CVE-2009-1098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099">CVE-2009-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100">CVE-2009-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101">CVE-2009-1101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102">CVE-2009-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103">CVE-2009-1103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104">CVE-2009-1104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105">CVE-2009-1105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106">CVE-2009-1106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107">CVE-2009-1107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475">CVE-2009-2475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476">CVE-2009-2476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670">CVE-2009-2670</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671">CVE-2009-2671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672">CVE-2009-2672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673">CVE-2009-2673</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674">CVE-2009-2674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675">CVE-2009-2675</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676">CVE-2009-2676</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689">CVE-2009-2689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690">CVE-2009-2690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716">CVE-2009-2716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718">CVE-2009-2718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719">CVE-2009-2719</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720">CVE-2009-2720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721">CVE-2009-2721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722">CVE-2009-2722</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723">CVE-2009-2723</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724">CVE-2009-2724</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3728">CVE-2009-3728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3729">CVE-2009-3729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865">CVE-2009-3865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866">CVE-2009-3866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867">CVE-2009-3867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868">CVE-2009-3868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869">CVE-2009-3869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871">CVE-2009-3871</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872">CVE-2009-3872</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873">CVE-2009-3873</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874">CVE-2009-3874</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875">CVE-2009-3875</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876">CVE-2009-3876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877">CVE-2009-3877</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3879">CVE-2009-3879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3880">CVE-2009-3880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3881">CVE-2009-3881</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3882">CVE-2009-3882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3883">CVE-2009-3883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3884">CVE-2009-3884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3886">CVE-2009-3886</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 07 Apr 2009 06:55:57 +0000">
+ <metadata tag="submitter" timestamp="2009-04-07T06:55:57Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Nov 2009 19:42:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-17T19:42:31Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200911-03.xml b/glsa-200911-03.xml
index 01a296a2..6c58f72d 100644
--- a/glsa-200911-03.xml
+++ b/glsa-200911-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-03">
<title>UW IMAP toolkit: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">c-client uw-imap</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>245425</bug>
<bug>252567</bug>
<access>remote</access>
@@ -72,26 +71,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/c-client-2007e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/c-client-2007e"</code>
<p>
All UW IMAP toolkit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2007e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2007e"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005">CVE-2008-5005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006">CVE-2008-5006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005">CVE-2008-5005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006">CVE-2008-5006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:17:18 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:17:18Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:27:25 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:27:25Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 13:23:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T13:23:47Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200911-04.xml b/glsa-200911-04.xml
index eb30656f..755703df 100644
--- a/glsa-200911-04.xml
+++ b/glsa-200911-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-04">
<title>dstat: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">dstat</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>293497</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/dstat-0.6.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/dstat-0.6.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894">CVE-2009-3894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894">CVE-2009-3894</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Nov 2009 12:30:20 +0000">
+ <metadata tag="requester" timestamp="2009-11-17T12:30:20Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Nov 2009 12:35:21 +0000">
+ <metadata tag="submitter" timestamp="2009-11-17T12:35:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 13:40:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T13:40:09Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-200911-05.xml b/glsa-200911-05.xml
index c552866f..d20a8ebc 100644
--- a/glsa-200911-05.xml
+++ b/glsa-200911-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code, or Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>285280</bug>
<bug>290710</bug>
<access>remote</access>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241">CVE-2009-3241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242">CVE-2009-3242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243">CVE-2009-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549">CVE-2009-3549</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550">CVE-2009-3550</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551">CVE-2009-3551</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829">CVE-2009-3829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241">CVE-2009-3241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242">CVE-2009-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243">CVE-2009-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549">CVE-2009-3549</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550">CVE-2009-3550</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551">CVE-2009-3551</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829">CVE-2009-3829</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Nov 2009 23:06:15 +0000">
+ <metadata tag="requester" timestamp="2009-11-04T23:06:15Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Nov 2009 23:24:04 +0000">
+ <metadata tag="submitter" timestamp="2009-11-04T23:24:04Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 15:36:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T15:36:13Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200911-06.xml b/glsa-200911-06.xml
index 30adba6d..5747d858 100644
--- a/glsa-200911-06.xml
+++ b/glsa-200911-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-06">
<title>PEAR Net_Traceroute: Command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary commands.
</synopsis>
<product type="ebuild">PEAR-Net_Traceroute</product>
- <announced>November 26, 2009</announced>
- <revised>November 26, 2009: 01</revised>
+ <announced>2009-11-26</announced>
+ <revised>2009-11-26: 01</revised>
<bug>294264</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-Net_Traceroute-0.21.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-Net_Traceroute-0.21.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4025">CVE-2009-4025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4025">CVE-2009-4025</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Nov 2009 07:38:17 +0000">
+ <metadata tag="requester" timestamp="2009-11-26T07:38:17Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Nov 2009 07:53:00 +0000">
+ <metadata tag="submitter" timestamp="2009-11-26T07:53:00Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Nov 2009 19:14:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-26T19:14:35Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200912-01.xml b/glsa-200912-01.xml
index 8dc3dff8..16885de4 100644
--- a/glsa-200912-01.xml
+++ b/glsa-200912-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200912-01">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
byte streams.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 01, 2009</announced>
- <revised>December 02, 2009: 02</revised>
+ <announced>2009-12-01</announced>
+ <revised>2009-12-02: 02</revised>
<bug>270305</bug>
<bug>280591</bug>
<bug>292022</bug>
@@ -73,23 +72,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8l-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8l-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377">CVE-2009-1377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378">CVE-2009-1378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379">CVE-2009-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387">CVE-2009-1387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377">CVE-2009-1377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378">CVE-2009-1378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379">CVE-2009-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387">CVE-2009-1387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Nov 2009 21:29:47 +0000">
+ <metadata tag="requester" timestamp="2009-11-23T21:29:47Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Nov 2009 13:42:39 +0000">
+ <metadata tag="submitter" timestamp="2009-11-30T13:42:39Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Dec 2009 21:28:40 +0000">
+ <metadata tag="bugReady" timestamp="2009-12-01T21:28:40Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-200912-02.xml b/glsa-200912-02.xml
index 6dcaa250..32b40367 100644
--- a/glsa-200912-02.xml
+++ b/glsa-200912-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200912-02">
<title>Ruby on Rails: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to the execution of arbitrary SQL statements.
</synopsis>
<product type="ebuild">rails</product>
- <announced>December 20, 2009</announced>
- <revised>December 20, 2009: 01</revised>
+ <announced>2009-12-20</announced>
+ <revised>2009-12-20: 01</revised>
<bug>200159</bug>
<bug>237385</bug>
<bug>247549</bug>
@@ -80,13 +79,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-2.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-2.3.5"</code>
<p>
All Ruby on Rails 2.2.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-ruby/rails-2.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-ruby/rails-2.2.3-r1"</code>
<p>
NOTE: All applications using Ruby on Rails should also be configured to
use the latest version available by running "rake rails:update" inside
@@ -94,23 +93,23 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6077">CVE-2007-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094">CVE-2008-4094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248">CVE-2008-7248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422">CVE-2009-2422</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3009">CVE-2009-3009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3086">CVE-2009-3086</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214">CVE-2009-4214</uri>
- <uri link="/security/en/glsa/glsa-200711-17.xml">GLSA 200711-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6077">CVE-2007-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094">CVE-2008-4094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248">CVE-2008-7248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422">CVE-2009-2422</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3009">CVE-2009-3009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3086">CVE-2009-3086</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214">CVE-2009-4214</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-17.xml">GLSA 200711-17</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 18:11:48 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T18:11:48Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 19:07:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T19:07:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Mar 2009 12:17:35 +0000">
+ <metadata tag="submitter" timestamp="2009-03-19T12:17:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201001-01.xml b/glsa-201001-01.xml
index 4e4e73dd..aac74f1a 100644
--- a/glsa-201001-01.xml
+++ b/glsa-201001-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-01">
<title>NTP: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>January 03, 2010</announced>
- <revised>January 03, 2010: 01</revised>
+ <announced>2010-01-03</announced>
+ <revised>2010-01-03: 01</revised>
<bug>290881</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563">CVE-2009-3563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563">CVE-2009-3563</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Dec 2009 20:02:44 +0000">
+ <metadata tag="requester" timestamp="2009-12-10T20:02:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2009 15:53:37 +0000">
+ <metadata tag="submitter" timestamp="2009-12-30T15:53:37Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jan 2010 00:05:58 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-03T00:05:58Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-02.xml b/glsa-201001-02.xml
index cae51109..0b08c9d7 100644
--- a/glsa-201001-02.xml
+++ b/glsa-201001-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-02">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 03, 2010</announced>
- <revised>January 03, 2010: 01</revised>
+ <announced>2010-01-03</announced>
+ <revised>2010-01-03: 01</revised>
<bug>296407</bug>
<access>remote</access>
<affected>
@@ -61,23 +60,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.42.34&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.42.34"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794">CVE-2009-3794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796">CVE-2009-3796</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797">CVE-2009-3797</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798">CVE-2009-3798</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799">CVE-2009-3799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800">CVE-2009-3800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794">CVE-2009-3794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796">CVE-2009-3796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797">CVE-2009-3797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798">CVE-2009-3798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799">CVE-2009-3799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800">CVE-2009-3800</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Dec 2009 01:11:11 +0000">
+ <metadata tag="requester" timestamp="2009-12-18T01:11:11Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 31 Dec 2009 14:21:28 +0000">
+ <metadata tag="submitter" timestamp="2009-12-31T14:21:28Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jan 2010 17:18:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-03T17:18:41Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201001-03.xml b/glsa-201001-03.xml
index 87637c01..0a759b25 100644
--- a/glsa-201001-03.xml
+++ b/glsa-201001-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-03">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>January 05, 2010</announced>
- <revised>January 05, 2010: 01</revised>
+ <announced>2010-01-05</announced>
+ <revised>2010-01-05: 01</revised>
<bug>249875</bug>
<bug>255121</bug>
<bug>260576</bug>
@@ -78,39 +77,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/c-client-2007e&quot;
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/c-client-2007e"
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498">CVE-2008-5498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557">CVE-2008-5557</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624">CVE-2008-5624</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625">CVE-2008-5625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658">CVE-2008-5658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814">CVE-2008-5814</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5844">CVE-2008-5844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002">CVE-2008-7002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754">CVE-2009-0754</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271">CVE-2009-1271</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1272">CVE-2009-1272</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626">CVE-2009-2626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687">CVE-2009-2687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291">CVE-2009-3291</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292">CVE-2009-3292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293">CVE-2009-3293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3557">CVE-2009-3557</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3558">CVE-2009-3558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017">CVE-2009-4017</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142">CVE-2009-4142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143">CVE-2009-4143</uri>
- <uri link="/security/en/glsa/glsa-200911-03.xml">GLSA 200911-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498">CVE-2008-5498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557">CVE-2008-5557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624">CVE-2008-5624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625">CVE-2008-5625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658">CVE-2008-5658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814">CVE-2008-5814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5844">CVE-2008-5844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002">CVE-2008-7002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754">CVE-2009-0754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271">CVE-2009-1271</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1272">CVE-2009-1272</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626">CVE-2009-2626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687">CVE-2009-2687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291">CVE-2009-3291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292">CVE-2009-3292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293">CVE-2009-3293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3557">CVE-2009-3557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3558">CVE-2009-3558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017">CVE-2009-4017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142">CVE-2009-4142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143">CVE-2009-4143</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200911-03.xml">GLSA 200911-03</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 06 Nov 2009 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2009-11-06T10:26:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Nov 2009 09:22:21 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-26T09:22:21Z">
rbu
</metadata>
</glsa>
diff --git a/glsa-201001-04.xml b/glsa-201001-04.xml
index 58a3ffc7..a4490786 100644
--- a/glsa-201001-04.xml
+++ b/glsa-201001-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-04">
<title>VirtualBox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for privilege escalation.
</synopsis>
<product type="ebuild">virtualbox-bin virtualbox-ose virtualbox-guest-additions virtualbox-ose-additions</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>288836</bug>
<bug>294678</bug>
<access>local</access>
@@ -66,40 +65,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-bin-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-bin-3.0.12"</code>
<p>
All users of the Open Source version of VirtualBox should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-ose-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-ose-3.0.12"</code>
<p>
All users of the binary VirtualBox Guest Additions should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-guest-additions-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-guest-additions-3.0.12"</code>
<p>
All users of the Open Source VirtualBox Guest Additions should upgrade
to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-ose-additions-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-ose-additions-3.0.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3692">CVE-2009-3692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940">CVE-2009-3940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3692">CVE-2009-3692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940">CVE-2009-3940</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Nov 2009 23:19:24 +0000">
+ <metadata tag="requester" timestamp="2009-11-09T23:19:24Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 20:50:17 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T20:50:17Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:41:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:41:20Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-05.xml b/glsa-201001-05.xml
index 8fc11766..df877e36 100644
--- a/glsa-201001-05.xml
+++ b/glsa-201001-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-05">
<title>net-snmp: Authorization bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
net-snmp.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>250429</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.2.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123">CVE-2008-6123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123">CVE-2008-6123</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Sep 2009 18:16:15 +0000">
+ <metadata tag="requester" timestamp="2009-09-28T18:16:15Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:17:32 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:17:32Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:57 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:57Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-06.xml b/glsa-201001-06.xml
index b651e3b0..4d4bfaf3 100644
--- a/glsa-201001-06.xml
+++ b/glsa-201001-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-06">
<title>aria2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">aria2</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>288291</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/aria2-1.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/aria2-1.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575">CVE-2009-3575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617">CVE-2009-3617</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575">CVE-2009-3575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617">CVE-2009-3617</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 09:27:41 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T09:27:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:05:40 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:05:40Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:46 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:46Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-07.xml b/glsa-201001-07.xml
index 5d5daba2..0ebad3a6 100644
--- a/glsa-201001-07.xml
+++ b/glsa-201001-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-07">
<title>Blender: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>245310</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.48a-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.48a-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4863">CVE-2008-4863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4863">CVE-2008-4863</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 19:04:32 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T19:04:32Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:25:09 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:25:09Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:27 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:27Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-08.xml b/glsa-201001-08.xml
index cd9f8768..efaae0d5 100644
--- a/glsa-201001-08.xml
+++ b/glsa-201001-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-08">
<title>SquirrelMail: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
results in remote code execution.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>269567</bug>
<bug>270671</bug>
<access>remote</access>
@@ -67,19 +66,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381">CVE-2009-1381</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578">CVE-2009-1578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579">CVE-2009-1579</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580">CVE-2009-1580</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1581">CVE-2009-1581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381">CVE-2009-1381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578">CVE-2009-1578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579">CVE-2009-1579</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580">CVE-2009-1580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1581">CVE-2009-1581</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:49:10 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:49:10Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Jan 2010 21:54:28 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-13T21:54:28Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201001-09.xml b/glsa-201001-09.xml
index 1eeb4f5a..8d834f0a 100644
--- a/glsa-201001-09.xml
+++ b/glsa-201001-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-09">
<title>Ruby: Terminal Control Character Injection</title>
<synopsis>
@@ -9,8 +8,8 @@
sessions.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>January 14, 2010</announced>
- <revised>January 14, 2010: 01</revised>
+ <announced>2010-01-14</announced>
+ <revised>2010-01-14: 01</revised>
<bug>300468</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.7_p249&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.7_p249"</code>
<p>
All Ruby 1.8.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p388&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p388"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492">CVE-2009-4492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492">CVE-2009-4492</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Jan 2010 19:56:42 +0000">
+ <metadata tag="requester" timestamp="2010-01-13T19:56:42Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Jan 2010 20:40:12 +0000">
+ <metadata tag="submitter" timestamp="2010-01-13T20:40:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Jan 2010 20:40:18 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-13T20:40:18Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201003-01.xml b/glsa-201003-01.xml
index 7adcbc04..8d0c77a4 100644
--- a/glsa-201003-01.xml
+++ b/glsa-201003-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201003-01">
<title>sudo: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
and execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>March 03, 2010</announced>
- <revised>March 03, 2010: 01</revised>
+ <announced>2010-03-03</announced>
+ <revised>2010-03-03: 01</revised>
<bug>306865</bug>
<access>local</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.2_p4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.2_p4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426">CVE-2010-0426</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427">CVE-2010-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426">CVE-2010-0426</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427">CVE-2010-0427</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Mar 2010 19:53:26 +0000">
+ <metadata tag="requester" timestamp="2010-03-02T19:53:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Mar 2010 20:22:07 +0000">
+ <metadata tag="submitter" timestamp="2010-03-02T20:22:07Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 03 Mar 2010 16:28:38 +0000">
+ <metadata tag="bugReady" timestamp="2010-03-03T16:28:38Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-01.xml b/glsa-201006-01.xml
index e3adae71..7a5e5eff 100644
--- a/glsa-201006-01.xml
+++ b/glsa-201006-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-01">
<title>FreeType 1: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>271234</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-1.4_pre20080316-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-1.4_pre20080316-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 27, 2009. It is likely that your system is already
@@ -56,18 +55,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
- <uri link="/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 Jun 2009 22:26:35 +0000">
+ <metadata tag="requester" timestamp="2009-06-01T22:26:35Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 10:59:47 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T10:59:47Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:32:56 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:32:56Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-02.xml b/glsa-201006-02.xml
index a1be29c6..b05fcf56 100644
--- a/glsa-201006-02.xml
+++ b/glsa-201006-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-02">
<title>CamlImages: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">camlimages</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>276235</bug>
<bug>290222</bug>
<access>remote</access>
@@ -58,17 +57,17 @@
# emerge --ask --oneshot --verbose =dev-ml/camlimages-3.0.2</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2295">CVE-2009-2295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2660">CVE-2009-2660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3296">CVE-2009-3296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2295">CVE-2009-2295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2660">CVE-2009-2660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3296">CVE-2009-3296</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 15:21:06 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T15:21:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 12:48:53 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T12:48:53Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 09:26:19 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T09:26:19Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-03.xml b/glsa-201006-03.xml
index 448eba7a..30e2a646 100644
--- a/glsa-201006-03.xml
+++ b/glsa-201006-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-03">
<title>ImageMagick: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>271502</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.5.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.5.2.9"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 4, 2009. It is likely that your system is already
@@ -58,15 +57,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882">CVE-2009-1882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882">CVE-2009-1882</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Jun 2009 18:15:07 +0000">
+ <metadata tag="requester" timestamp="2009-06-03T18:15:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 11:23:27 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T11:23:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:32:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:32:51Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-04.xml b/glsa-201006-04.xml
index 0243c50a..5b248e6d 100644
--- a/glsa-201006-04.xml
+++ b/glsa-201006-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-04">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>234777</bug>
<bug>249041</bug>
<bug>260069</bug>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.16.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.16.3"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since April 10, 2009. It is likely that your system is
@@ -60,33 +59,33 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231">CVE-2008-3231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233">CVE-2008-5233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234">CVE-2008-5234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235">CVE-2008-5235</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236">CVE-2008-5236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237">CVE-2008-5237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238">CVE-2008-5238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239">CVE-2008-5239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240">CVE-2008-5240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241">CVE-2008-5241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242">CVE-2008-5242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243">CVE-2008-5243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244">CVE-2008-5244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245">CVE-2008-5245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246">CVE-2008-5246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247">CVE-2008-5247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248">CVE-2008-5248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698">CVE-2009-0698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274">CVE-2009-1274</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231">CVE-2008-3231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233">CVE-2008-5233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234">CVE-2008-5234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235">CVE-2008-5235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236">CVE-2008-5236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237">CVE-2008-5237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238">CVE-2008-5238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239">CVE-2008-5239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240">CVE-2008-5240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241">CVE-2008-5241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242">CVE-2008-5242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243">CVE-2008-5243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244">CVE-2008-5244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245">CVE-2008-5245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246">CVE-2008-5246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247">CVE-2008-5247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248">CVE-2008-5248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698">CVE-2009-0698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274">CVE-2009-1274</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Sep 2008 18:16:02 +0000">
+ <metadata tag="requester" timestamp="2008-09-03T18:16:02Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 10:31:16 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T10:31:16Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:39:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:39:41Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-05.xml b/glsa-201006-05.xml
index af092cd9..cfad60d3 100644
--- a/glsa-201006-05.xml
+++ b/glsa-201006-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>297388</bug>
<bug>318935</bug>
<access>remote</access>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376">CVE-2009-4376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377">CVE-2009-4377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4378">CVE-2009-4378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455">CVE-2010-1455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376">CVE-2009-4376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377">CVE-2009-4377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4378">CVE-2009-4378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455">CVE-2010-1455</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jan 2010 17:26:37 +0000">
+ <metadata tag="requester" timestamp="2010-01-08T17:26:37Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:48:39 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:48:39Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:50:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:50:20Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-06.xml b/glsa-201006-06.xml
index a4346d69..31bbccc0 100644
--- a/glsa-201006-06.xml
+++ b/glsa-201006-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-06">
<title>Transmission: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">transmission</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>309831</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/transmission-1.92&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/transmission-1.92"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1853">CVE-2010-1853</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1853">CVE-2010-1853</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:12:44 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:12:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:42:12 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:42:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:53:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:53:20Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-07.xml b/glsa-201006-07.xml
index 945f28e7..27a9070e 100644
--- a/glsa-201006-07.xml
+++ b/glsa-201006-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-07">
<title>SILC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the worst of which allowing for execution of arbitrary code.
</synopsis>
<product type="ebuild">silc-toolkit silc-client</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>284561</bug>
<access>remote</access>
<affected>
@@ -54,27 +53,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-toolkit-1.1.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-toolkit-1.1.10"</code>
<p>
All SILC Client users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-client-1.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-client-1.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159">CVE-2008-7159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160">CVE-2008-7160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051">CVE-2009-3051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3163">CVE-2009-3163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159">CVE-2008-7159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160">CVE-2008-7160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051">CVE-2009-3051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3163">CVE-2009-3163</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:17:59 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:17:59Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:36:35 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:36:35Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:55:42 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:55:42Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-08.xml b/glsa-201006-08.xml
index 9e24b753..b4d7ac6a 100644
--- a/glsa-201006-08.xml
+++ b/glsa-201006-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-08">
<title>nano: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of ownerships of important files.
</synopsis>
<product type="ebuild">nano</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>315355</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/nano-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/nano-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160">CVE-2010-1160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161">CVE-2010-1161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160">CVE-2010-1160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161">CVE-2010-1161</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Apr 2010 14:22:38 +0000">
+ <metadata tag="requester" timestamp="2010-04-30T14:22:38Z">
chiiph
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 14:24:42 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T14:24:42Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:43:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:43:51Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-09.xml b/glsa-201006-09.xml
index 3283b973..c06e4c49 100644
--- a/glsa-201006-09.xml
+++ b/glsa-201006-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-09">
<title>sudo: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>321697</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.2_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.2_p6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163">CVE-2010-1163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163">CVE-2010-1163</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 May 2010 20:27:33 +0000">
+ <metadata tag="requester" timestamp="2010-05-29T20:27:33Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 14:58:46 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T14:58:46Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:08:55 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:08:55Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-10.xml b/glsa-201006-10.xml
index a27f0300..cd7d7bc8 100644
--- a/glsa-201006-10.xml
+++ b/glsa-201006-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-10">
<title>multipath-tools: World-writeable socket</title>
<synopsis>
@@ -9,8 +8,8 @@
users.
</synopsis>
<product type="ebuild">multipath-tools</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>264564</bug>
<access>local</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/multipath-tools-0.4.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/multipath-tools-0.4.8-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 13, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115">CVE-2009-0115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115">CVE-2009-0115</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jan 2010 23:30:44 +0000">
+ <metadata tag="requester" timestamp="2010-01-29T23:30:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 17:36:36 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T17:36:36Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 12:41:09 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T12:41:09Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201006-11.xml b/glsa-201006-11.xml
index c4cb1c01..4bcd1d25 100644
--- a/glsa-201006-11.xml
+++ b/glsa-201006-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-11">
<title>BIND: Multiple vulnerabilities</title>
<synopsis>
Several cache poisoning vulnerabilities have been found in BIND.
</synopsis>
<product type="ebuild">BIND</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>301548</bug>
<bug>308035</bug>
<access>remote</access>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p5"</code>
</resolution>
<references>
<uri link="https://www.isc.org/advisories/CVE2009-4022">ISC Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022">CVE-2009-4022</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097">CVE-2010-0097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290">CVE-2010-0290</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382">CVE-2010-0382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022">CVE-2009-4022</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097">CVE-2010-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290">CVE-2010-0290</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382">CVE-2010-0382</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Mar 2010 22:15:31 +0000">
+ <metadata tag="requester" timestamp="2010-03-29T22:15:31Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 17:11:37 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T17:11:37Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 18:23:04 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T18:23:04Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-12.xml b/glsa-201006-12.xml
index 4bf64b00..134468dc 100644
--- a/glsa-201006-12.xml
+++ b/glsa-201006-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-12">
<title>Fetchmail: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>280537</bug>
<bug>307761</bug>
<access>remote</access>
@@ -67,19 +66,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.3.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.3.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562">CVE-2010-0562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562">CVE-2010-0562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Mar 2010 22:13:20 +0000">
+ <metadata tag="requester" timestamp="2010-03-29T22:13:20Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:34:40 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:34:40Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:49:00 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:49:00Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201006-13.xml b/glsa-201006-13.xml
index 3f551130..4bbc8de8 100644
--- a/glsa-201006-13.xml
+++ b/glsa-201006-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-13">
<title>Smarty: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary PHP code.
</synopsis>
<product type="ebuild">smarty</product>
- <announced>June 02, 2010</announced>
- <revised>June 02, 2010: 01</revised>
+ <announced>2010-06-02</announced>
+ <revised>2010-06-02: 01</revised>
<bug>212147</bug>
<bug>243856</bug>
<bug>270494</bug>
@@ -59,7 +58,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/smarty-2.6.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/smarty-2.6.23"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 2, 2009. It is likely that your system is already
@@ -67,18 +66,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066">CVE-2008-1066</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4810">CVE-2008-4810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4811">CVE-2008-4811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1669">CVE-2009-1669</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066">CVE-2008-1066</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4810">CVE-2008-4810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4811">CVE-2008-4811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1669">CVE-2009-1669</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Mar 2008 21:06:13 +0000">
+ <metadata tag="requester" timestamp="2008-03-15T21:06:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 19:51:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T19:51:21Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 11:16:44 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T11:16:44Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-14.xml b/glsa-201006-14.xml
index ab654ffa..dce23ffd 100644
--- a/glsa-201006-14.xml
+++ b/glsa-201006-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-14">
<title>Newt: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">newt</product>
- <announced>June 02, 2010</announced>
- <revised>June 02, 2010: 01</revised>
+ <announced>2010-06-02</announced>
+ <revised>2010-06-02: 01</revised>
<bug>285854</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/newt-0.52.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/newt-0.52.10-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since October 26, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905">CVE-2009-2905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905">CVE-2009-2905</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 09:28:48 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T09:28:48Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 05:47:34 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T05:47:34Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:47:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T05:47:41Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-15.xml b/glsa-201006-15.xml
index fdce6a28..db803700 100644
--- a/glsa-201006-15.xml
+++ b/glsa-201006-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-15">
<title>XEmacs: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xemacs</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>275397</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/xemacs-21.4.22-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/xemacs-21.4.22-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since July 26, 2009. It is likely that your system is already
@@ -58,15 +57,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688">CVE-2009-2688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688">CVE-2009-2688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Jul 2009 20:43:44 +0000">
+ <metadata tag="requester" timestamp="2009-07-30T20:43:44Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 06:40:54 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T06:40:54Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 06:41:02 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T06:41:02Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-16.xml b/glsa-201006-16.xml
index 5ec1e91b..b0677a71 100644
--- a/glsa-201006-16.xml
+++ b/glsa-201006-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-16">
<title>GD: User-assisted execution of arbitrary code</title>
<synopsis>
The GD library is prone to a buffer overflow vulnerability.
</synopsis>
<product type="ebuild">gd</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>292130</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gd-2.0.35-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.35-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 21, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Dec 2009 02:08:27 +0000">
+ <metadata tag="requester" timestamp="2009-12-18T02:08:27Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 05:59:40 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T05:59:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:59:48 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T05:59:48Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-17.xml b/glsa-201006-17.xml
index f464c01c..e00998bc 100644
--- a/glsa-201006-17.xml
+++ b/glsa-201006-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-17">
<title>lighttpd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>303213</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.25-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.25-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295">CVE-2010-0295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295">CVE-2010-0295</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Mar 2010 14:19:51 +0000">
+ <metadata tag="requester" timestamp="2010-03-15T14:19:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 15:20:53 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T15:20:53Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:20:59 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:20:59Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-18.xml b/glsa-201006-18.xml
index 3327e4b5..fdb08da5 100644
--- a/glsa-201006-18.xml
+++ b/glsa-201006-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-18">
<title>Oracle JRE/JDK: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 01</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 01</revised>
<bug>306579</bug>
<bug>314531</bug>
<access>remote</access>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.20"</code>
<p>
All Oracle JDK 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.20"</code>
<p>
All users of the precompiled 32bit Oracle JRE 1.6.x should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.20"</code>
<p>
All Oracle JRE 1.5.x, Oracle JDK 1.5.x, and precompiled 32bit Oracle
JRE 1.5.x users are strongly advised to unmerge Java 1.5:
@@ -97,45 +96,45 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082">CVE-2010-0082</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084">CVE-2010-0084</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085">CVE-2010-0085</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087">CVE-2010-0087</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088">CVE-2010-0088</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089">CVE-2010-0089</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090">CVE-2010-0090</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091">CVE-2010-0091</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092">CVE-2010-0092</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093">CVE-2010-0093</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094">CVE-2010-0094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095">CVE-2010-0095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837">CVE-2010-0837</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838">CVE-2010-0838</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839">CVE-2010-0839</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840">CVE-2010-0840</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841">CVE-2010-0841</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842">CVE-2010-0842</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843">CVE-2010-0843</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844">CVE-2010-0844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845">CVE-2010-0845</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846">CVE-2010-0846</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847">CVE-2010-0847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848">CVE-2010-0848</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849">CVE-2010-0849</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850">CVE-2010-0850</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886">CVE-2010-0886</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887">CVE-2010-0887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082">CVE-2010-0082</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084">CVE-2010-0084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085">CVE-2010-0085</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087">CVE-2010-0087</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088">CVE-2010-0088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089">CVE-2010-0089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090">CVE-2010-0090</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091">CVE-2010-0091</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092">CVE-2010-0092</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093">CVE-2010-0093</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094">CVE-2010-0094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095">CVE-2010-0095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837">CVE-2010-0837</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838">CVE-2010-0838</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839">CVE-2010-0839</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840">CVE-2010-0840</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841">CVE-2010-0841</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842">CVE-2010-0842</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843">CVE-2010-0843</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844">CVE-2010-0844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845">CVE-2010-0845</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846">CVE-2010-0846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847">CVE-2010-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848">CVE-2010-0848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849">CVE-2010-0849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850">CVE-2010-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886">CVE-2010-0886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887">CVE-2010-0887</uri>
<uri link="/doc/en/java.xml#doc_chap4">Gentoo Linux Java documentation</uri>
- <uri link="http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html">Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010</uri>
+ <uri link="https://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html">Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Apr 2010 09:43:04 +0000">
+ <metadata tag="requester" timestamp="2010-04-02T09:43:04Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Apr 2010 09:59:07 +0000">
+ <metadata tag="submitter" timestamp="2010-04-02T09:59:07Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jun 2010 05:06:52 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-04T05:06:52Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-19.xml b/glsa-201006-19.xml
index 6ed0b041..06b70168 100644
--- a/glsa-201006-19.xml
+++ b/glsa-201006-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-19">
<title>Bugzilla: Multiple vulnerabilities</title>
<synopsis>
Bugzilla is prone to multiple medium severity vulnerabilities.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 02</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 02</revised>
<bug>239564</bug>
<bug>258592</bug>
<bug>264572</bug>
@@ -53,7 +52,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-3.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-3.2.6"</code>
<p>
Bugzilla 2.x and 3.0 have reached their end of life. There will be no
more security updates. All Bugzilla 2.x and 3.0 users should update to
@@ -61,25 +60,25 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4437">CVE-2008-4437</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6098">CVE-2008-6098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0481">CVE-2009-0481</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0482">CVE-2009-0482</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0483">CVE-2009-0483</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0484">CVE-2009-0484</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0485">CVE-2009-0485</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0486">CVE-2009-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1213">CVE-2009-1213</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3125">CVE-2009-3125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3165">CVE-2009-3165</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3166">CVE-2009-3166</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3387">CVE-2009-3387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3989">CVE-2009-3989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4437">CVE-2008-4437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6098">CVE-2008-6098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0481">CVE-2009-0481</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0482">CVE-2009-0482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0483">CVE-2009-0483</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0484">CVE-2009-0484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0485">CVE-2009-0485</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0486">CVE-2009-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1213">CVE-2009-1213</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3125">CVE-2009-3125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3165">CVE-2009-3165</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3166">CVE-2009-3166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3387">CVE-2009-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3989">CVE-2009-3989</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Feb 2009 18:17:01 +0000">
+ <metadata tag="submitter" timestamp="2009-02-14T18:17:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Oct 2009 16:01:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-10T16:01:17Z">
jaervosz
</metadata>
</glsa>
diff --git a/glsa-201006-20.xml b/glsa-201006-20.xml
index a2362143..14cb1e89 100644
--- a/glsa-201006-20.xml
+++ b/glsa-201006-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-20">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service condition, or conduct other attacks.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 01</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 01</revised>
<bug>281107</bug>
<bug>283624</bug>
<bug>284892</bug>
@@ -62,7 +61,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.37&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.37"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since January 5, 2010. It is likely that your system is
@@ -70,19 +69,19 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726">CVE-2009-2726</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346">CVE-2009-2346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055">CVE-2009-4055</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727">CVE-2009-3727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220">CVE-2008-7220</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726">CVE-2009-2726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346">CVE-2009-2346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055">CVE-2009-4055</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727">CVE-2009-3727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220">CVE-2008-7220</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 13:21:43 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T13:21:43Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 15:08:16 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T15:08:16Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:08:22 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:08:22Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201006-21.xml b/glsa-201006-21.xml
index 31cdc1d5..3bb499ad 100644
--- a/glsa-201006-21.xml
+++ b/glsa-201006-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-21">
<title>UnrealIRCd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise the "unrealircd" account, or cause a Denial of Service.
</synopsis>
<product type="ebuild">unrealircd</product>
- <announced>June 14, 2010</announced>
- <revised>June 14, 2010: 02</revised>
+ <announced>2010-06-14</announced>
+ <revised>2010-06-14: 02</revised>
<bug>260806</bug>
<bug>323691</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/unrealircd-3.2.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/unrealircd-3.2.8.1-r1"</code>
</resolution>
<references>
<uri link="http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt">UnrealIRCd Security Advisory 20090413</uri>
<uri link="http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt">UnrealIRCd Security Advisory 20100612</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4893">CVE-2009-4893</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075">CVE-2010-2075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4893">CVE-2009-4893</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075">CVE-2010-2075</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Jun 2010 21:31:31 +0000">
+ <metadata tag="requester" timestamp="2010-06-12T21:31:31Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Jun 2010 17:00:57 +0000">
+ <metadata tag="submitter" timestamp="2010-06-14T17:00:57Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Jun 2010 17:17:46 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-14T17:17:46Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201009-01.xml b/glsa-201009-01.xml
index 65263aac..89a28ea8 100644
--- a/glsa-201009-01.xml
+++ b/glsa-201009-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-01">
<title>wxGTK: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
cause the execution of arbitrary code.
</synopsis>
<product type="ebuild">wxGTK</product>
- <announced>September 02, 2010</announced>
- <revised>September 02, 2010: 01</revised>
+ <announced>2010-09-02</announced>
+ <revised>2010-09-02: 01</revised>
<bug>277722</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/wxGTK-2.6.4.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/wxGTK-2.6.4.0-r5"</code>
<p>
All wxGTK 2.8 users should upgrade to an updated version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/wxGTK-2.8.10.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/wxGTK-2.8.10.1-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 9, 2009. It is likely that your system is
@@ -65,15 +64,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2369">CVE-2009-2369</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2369">CVE-2009-2369</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 04 Oct 2009 23:41:42 +0000">
+ <metadata tag="requester" timestamp="2009-10-04T23:41:42Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Jun 2010 12:09:45 +0000">
+ <metadata tag="submitter" timestamp="2010-06-01T12:09:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 14:53:47 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T14:53:47Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201009-02.xml b/glsa-201009-02.xml
index ef100786..b5180aa0 100644
--- a/glsa-201009-02.xml
+++ b/glsa-201009-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-02">
<title>Maildrop: privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
elevate their privileges.
</synopsis>
<product type="ebuild">maildrop</product>
- <announced>September 06, 2010</announced>
- <revised>September 06, 2010: 01</revised>
+ <announced>2010-09-06</announced>
+ <revised>2010-09-06: 01</revised>
<bug>308043</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/maildrop-2.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/maildrop-2.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301">CVE-2010-0301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301">CVE-2010-0301</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Aug 2010 09:32:26 +0000">
+ <metadata tag="requester" timestamp="2010-08-29T09:32:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 03 Sep 2010 21:46:47 +0000">
+ <metadata tag="submitter" timestamp="2010-09-03T21:46:47Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:46:57 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:46:57Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201009-03.xml b/glsa-201009-03.xml
index f5072945..3c8ce109 100644
--- a/glsa-201009-03.xml
+++ b/glsa-201009-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-03">
<title>sudo: Privilege Escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalate privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>322517</bug>
<bug>335381</bug>
<access>local</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.4_p3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.4_p3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646">CVE-2010-1646</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956">CVE-2010-2956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646">CVE-2010-1646</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956">CVE-2010-2956</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jun 2010 19:16:17 +0000">
+ <metadata tag="requester" timestamp="2010-06-13T19:16:17Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Jun 2010 19:16:52 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-13T19:16:52Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Sep 2010 11:40:54 +0000">
+ <metadata tag="submitter" timestamp="2010-09-07T11:40:54Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201009-04.xml b/glsa-201009-04.xml
index eecb6647..cc918f5c 100644
--- a/glsa-201009-04.xml
+++ b/glsa-201009-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-04">
<title>SARG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
SARG allowing for remote code execution.
</synopsis>
<product type="ebuild">SARG sarg</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>222121</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/sarg-2.2.5-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/sarg-2.2.5-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922">CVE-2008-1922</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922">CVE-2008-1922</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Jul 2009 23:13:31 +0000">
+ <metadata tag="requester" timestamp="2009-07-12T23:13:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Apr 2010 02:16:14 +0000">
+ <metadata tag="submitter" timestamp="2010-04-10T02:16:14Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:21:35 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:21:35Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201009-05.xml b/glsa-201009-05.xml
index 55646aaa..bd439188 100644
--- a/glsa-201009-05.xml
+++ b/glsa-201009-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-05">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>297385</bug>
<bug>306429</bug>
<bug>313343</bug>
@@ -54,58 +53,58 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.3.4"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/advisories/apsa10-01.html">APSA10-01</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-02.html">APSB10-02</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-07.html">APSB10-07</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-09.html">APSB10-09</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953">CVE-2009-3953</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324">CVE-2009-4324</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188">CVE-2010-0188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190">CVE-2010-0190</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191">CVE-2010-0191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192">CVE-2010-0192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193">CVE-2010-0193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194">CVE-2010-0194</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195">CVE-2010-0195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196">CVE-2010-0196</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197">CVE-2010-0197</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198">CVE-2010-0198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199">CVE-2010-0199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201">CVE-2010-0201</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202">CVE-2010-0202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203">CVE-2010-0203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204">CVE-2010-0204</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241">CVE-2010-1241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285">CVE-2010-1285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295">CVE-2010-1295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168">CVE-2010-2168</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201">CVE-2010-2201</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202">CVE-2010-2202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203">CVE-2010-2203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204">CVE-2010-2204</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205">CVE-2010-2205</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206">CVE-2010-2206</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207">CVE-2010-2207</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208">CVE-2010-2208</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209">CVE-2010-2209</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210">CVE-2010-2210</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211">CVE-2010-2211</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212">CVE-2010-2212</uri>
+ <uri link="https://www.adobe.com/support/security/advisories/apsa10-01.html">APSA10-01</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-02.html">APSB10-02</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-07.html">APSB10-07</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-09.html">APSB10-09</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953">CVE-2009-3953</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324">CVE-2009-4324</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188">CVE-2010-0188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190">CVE-2010-0190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191">CVE-2010-0191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192">CVE-2010-0192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193">CVE-2010-0193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194">CVE-2010-0194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195">CVE-2010-0195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196">CVE-2010-0196</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197">CVE-2010-0197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198">CVE-2010-0198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199">CVE-2010-0199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201">CVE-2010-0201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202">CVE-2010-0202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203">CVE-2010-0203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204">CVE-2010-0204</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241">CVE-2010-1241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285">CVE-2010-1285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295">CVE-2010-1295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168">CVE-2010-2168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201">CVE-2010-2201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202">CVE-2010-2202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203">CVE-2010-2203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204">CVE-2010-2204</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205">CVE-2010-2205</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206">CVE-2010-2206</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207">CVE-2010-2207</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208">CVE-2010-2208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209">CVE-2010-2209</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210">CVE-2010-2210</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211">CVE-2010-2211</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212">CVE-2010-2212</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Mar 2010 19:31:53 +0000">
+ <metadata tag="requester" timestamp="2010-03-05T19:31:53Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 16:55:00 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T16:55:00Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:24:06 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:24:06Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201009-06.xml b/glsa-201009-06.xml
index 76b9bb09..9a7fcc9a 100644
--- a/glsa-201009-06.xml
+++ b/glsa-201009-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-06">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Clam AntiVirus.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>314087</bug>
<bug>321157</bug>
<access>remote</access>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.96.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.96.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098">CVE-2010-0098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311">CVE-2010-1311</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639">CVE-2010-1639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640">CVE-2010-1640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098">CVE-2010-0098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311">CVE-2010-1311</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639">CVE-2010-1639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640">CVE-2010-1640</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:19:32 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:19:32Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:26:38 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:26:38Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Aug 2010 20:31:24 +0000">
+ <metadata tag="bugReady" timestamp="2010-08-11T20:31:24Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201009-07.xml b/glsa-201009-07.xml
index b798248f..486d735c 100644
--- a/glsa-201009-07.xml
+++ b/glsa-201009-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-07">
<title>libxml2: Denial of Service</title>
<synopsis>
Multiple Denial of Services vulnerabilities were found in libxml2.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>September 21, 2010</announced>
- <revised>September 21, 2010: 01</revised>
+ <announced>2010-09-21</announced>
+ <revised>2010-09-21: 01</revised>
<bug>280617</bug>
<access>remote</access>
<affected>
@@ -57,7 +56,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.7.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.7.3-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 30, 2009. It is likely that your system is
@@ -65,16 +64,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414">CVE-2009-2414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416">CVE-2009-2416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414">CVE-2009-2414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416">CVE-2009-2416</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:15:14 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:15:14Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 13:13:48 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T13:13:48Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:03:32 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:03:32Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201009-08.xml b/glsa-201009-08.xml
index d6b0e82e..3938edd5 100644
--- a/glsa-201009-08.xml
+++ b/glsa-201009-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-08">
<title>python-updater: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">python-updater</product>
- <announced>September 21, 2010</announced>
- <revised>September 21, 2010: 01</revised>
+ <announced>2010-09-21</announced>
+ <revised>2010-09-21: 01</revised>
<bug>288361</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/python-updater-0.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/python-updater-0.7-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Thu, 18 Mar 2010 00:20:22 +0000">
+ <metadata tag="requester" timestamp="2010-03-18T00:20:22Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 16:48:48 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T16:48:48Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 20:36:47 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T20:36:47Z">
craig
</metadata>
</glsa>
diff --git a/glsa-201009-09.xml b/glsa-201009-09.xml
index 163ac301..3bf4a1ad 100644
--- a/glsa-201009-09.xml
+++ b/glsa-201009-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-09">
<title>fence: Multiple symlink vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local users to overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">fence</product>
- <announced>September 29, 2010</announced>
- <revised>September 29, 2010: 01</revised>
+ <announced>2010-09-29</announced>
+ <revised>2010-09-29: 01</revised>
<bug>240576</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
# emerge --unmerge sys-cluster/fence</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4579">CVE-2008-4579</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4580">CVE-2008-4580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4579">CVE-2008-4579</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4580">CVE-2008-4580</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 11:03:13 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T11:03:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Apr 2010 02:06:28 +0000">
+ <metadata tag="submitter" timestamp="2010-04-10T02:06:28Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:37:24 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:37:24Z">
a3li
</metadata>
</glsa>
diff --git a/glsa-201010-01.xml b/glsa-201010-01.xml
index bd7bdae8..2d80c2ee 100644
--- a/glsa-201010-01.xml
+++ b/glsa-201010-01.xml
@@ -6,8 +6,8 @@
escalation or a Denial of Service.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>October 05, 2010</announced>
- <revised>January 03, 2017: 9</revised>
+ <announced>2010-10-05</announced>
+ <revised>2017-01-03: 9</revised>
<bug>307637</bug>
<bug>324153</bug>
<bug>335887</bug>
@@ -68,17 +68,17 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205">
CVE-2010-0205
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205">
CVE-2010-1205
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249">
CVE-2010-2249
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 22:32:46 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:37:30 +0000">system</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jan 2017 04:37:31 +0000">system</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T22:32:46Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:37:30Z">system</metadata>
+ <metadata tag="bugReady" timestamp="2017-01-03T04:37:31Z">system</metadata>
</glsa>
diff --git a/glsa-201011-01.xml b/glsa-201011-01.xml
index cc3091ad..3686afbf 100644
--- a/glsa-201011-01.xml
+++ b/glsa-201011-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201011-01">
<title>GNU C library: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local attackers to execute arbitrary code as root.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>November 15, 2010</announced>
- <revised>November 15, 2010: 01</revised>
+ <announced>2010-11-15</announced>
+ <revised>2010-11-15: 01</revised>
<bug>285818</bug>
<bug>325555</bug>
<bug>330923</bug>
@@ -54,23 +53,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/glibc-2.11.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/glibc-2.11.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880">CVE-2009-4880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881">CVE-2009-4881</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296">CVE-2010-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830">CVE-2010-0830</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847">CVE-2010-3847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856">CVE-2010-3856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880">CVE-2009-4880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881">CVE-2009-4881</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296">CVE-2010-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830">CVE-2010-0830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847">CVE-2010-3847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856">CVE-2010-3856</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Nov 2009 17:50:04 +0000">
+ <metadata tag="requester" timestamp="2009-11-23T17:50:04Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2010 19:59:41 +0000">
+ <metadata tag="submitter" timestamp="2010-11-14T19:59:41Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Nov 2010 21:29:42 +0000">
+ <metadata tag="bugReady" timestamp="2010-11-15T21:29:42Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201012-01.xml b/glsa-201012-01.xml
index 871306a1..87398057 100644
--- a/glsa-201012-01.xml
+++ b/glsa-201012-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201012-01">
<title>Chromium: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 17, 2010</announced>
- <revised>December 17, 2010: 01</revised>
+ <announced>2010-12-17</announced>
+ <revised>2010-12-17: 01</revised>
<bug>325451</bug>
<bug>326717</bug>
<bug>330003</bug>
@@ -73,27 +72,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/chromium-8.0.552.224&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/chromium-8.0.552.224"</code>
</resolution>
<references>
- <uri link="http://googlechromereleases.blogspot.com/2010/06/stable-channel-update_24.html">Release Notes 5.0.375.86</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html">Release Notes 5.0.375.99</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html">Release Notes 5.0.375.125</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html">Release Notes 5.0.375.127</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html">Release Notes 6.0.472.59</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html">Release Notes 6.0.472.62</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html">Release Notes 7.0.517.41</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html">Release Notes 7.0.517.44</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html">Release Notes 8.0.552.215</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html">Release Notes 8.0.552.224</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/06/stable-channel-update_24.html">Release Notes 5.0.375.86</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html">Release Notes 5.0.375.99</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html">Release Notes 5.0.375.125</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html">Release Notes 5.0.375.127</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html">Release Notes 6.0.472.59</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html">Release Notes 6.0.472.62</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html">Release Notes 7.0.517.41</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html">Release Notes 7.0.517.44</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html">Release Notes 8.0.552.215</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html">Release Notes 8.0.552.224</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Jul 2010 21:33:07 +0000">
+ <metadata tag="requester" timestamp="2010-07-06T21:33:07Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Nov 2010 20:16:17 +0000">
+ <metadata tag="submitter" timestamp="2010-11-20T20:16:17Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Dec 2010 14:59:00 +0000">
+ <metadata tag="bugReady" timestamp="2010-12-17T14:59:00Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201101-01.xml b/glsa-201101-01.xml
index 906eb036..43973c24 100644
--- a/glsa-201101-01.xml
+++ b/glsa-201101-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-01">
<title>gif2png: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arguments.
</synopsis>
<product type="ebuild">gif2png</product>
- <announced>January 05, 2011</announced>
- <revised>January 05, 2011: 01</revised>
+ <announced>2011-01-05</announced>
+ <revised>2011-01-05: 01</revised>
<bug>346501</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gif2png-2.5.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gif2png-2.5.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5018">CVE-2009-5018</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5018">CVE-2009-5018</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Dec 2010 20:36:18 +0000">
+ <metadata tag="requester" timestamp="2010-12-10T20:36:18Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jan 2011 04:34:18 +0000">
+ <metadata tag="submitter" timestamp="2011-01-04T04:34:18Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Jan 2011 17:46:37 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-04T17:46:37Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201101-02.xml b/glsa-201101-02.xml
index 3ebf52fa..84cd07c4 100644
--- a/glsa-201101-02.xml
+++ b/glsa-201101-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-02">
<title>Tor: Remote heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>349312</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.2.1.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.2.1.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676">CVE-2010-1676</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676">CVE-2010-1676</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Jan 2011 23:48:00 +0000">
+ <metadata tag="requester" timestamp="2011-01-07T23:48:00Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Jan 2011 05:24:30 +0000">
+ <metadata tag="submitter" timestamp="2011-01-08T05:24:30Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Jan 2011 05:24:40 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-08T05:24:40Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201101-03.xml b/glsa-201101-03.xml
index 6f498b88..f3684ab2 100644
--- a/glsa-201101-03.xml
+++ b/glsa-201101-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-03">
<title>libvpx: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">libvpx</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>345559</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvpx-0.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvpx-0.9.5"</code>
<p>
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying some of these
@@ -57,15 +56,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4203">CVE-2010-4203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4203">CVE-2010-4203</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Dec 2010 01:15:02 +0000">
+ <metadata tag="requester" timestamp="2010-12-13T01:15:02Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Jan 2011 05:26:31 +0000">
+ <metadata tag="submitter" timestamp="2011-01-05T05:26:31Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Jan 2011 16:42:00 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-07T16:42:00Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201101-04.xml b/glsa-201101-04.xml
index 7c7a70a8..a0f0c3b1 100644
--- a/glsa-201101-04.xml
+++ b/glsa-201101-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-04">
<title>aria2: Directory traversal</title>
<synopsis>
A directory traversal vulnerability has been found in aria2.
</synopsis>
<product type="ebuild">aria2</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>320975</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/aria2-1.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/aria2-1.9.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1512">CVE-2010-1512</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1512">CVE-2010-1512</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 May 2010 20:17:09 +0000">
+ <metadata tag="requester" timestamp="2010-05-23T20:17:09Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:19:55 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:19:55Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:46:48 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:46:48Z">
vorlon
</metadata>
</glsa>
diff --git a/glsa-201101-05.xml b/glsa-201101-05.xml
index 9320122f..45499a8b 100644
--- a/glsa-201101-05.xml
+++ b/glsa-201101-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-05">
<title>OpenAFS: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenAFS</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>265538</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250">CVE-2009-1250</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251">CVE-2009-1251</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250">CVE-2009-1250</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251">CVE-2009-1251</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 01 Jun 2010 20:56:43 +0000">
+ <metadata tag="submitter" timestamp="2010-06-01T20:56:43Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2010 20:07:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-21T20:07:41Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201101-06.xml b/glsa-201101-06.xml
index 559fd0aa..47b2d89a 100644
--- a/glsa-201101-06.xml
+++ b/glsa-201101-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-06">
<title>IO::Socket::SSL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">IO::Socket::SSL</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>276360</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/IO-Socket-SSL-1.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/IO-Socket-SSL-1.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3024">CVE-2009-3024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3024">CVE-2009-3024</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:07:06 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:07:06Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:25:53 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:25:53Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2010 19:52:04 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-22T19:52:04Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201101-07.xml b/glsa-201101-07.xml
index 31924b56..c4ce9353 100644
--- a/glsa-201101-07.xml
+++ b/glsa-201101-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-07">
<title>Prewikka: password disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
password used by Prewikka.
</synopsis>
<product type="ebuild">Prewikka</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>270056</bug>
<access>local</access>
<affected>
@@ -46,7 +45,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/prewikka-0.9.14-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/prewikka-0.9.14-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 18, 2009 . It is likely that your system is already
@@ -54,15 +53,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2058">CVE-2010-2058</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2058">CVE-2010-2058</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Jun 2009 20:26:04 +0000">
+ <metadata tag="requester" timestamp="2009-06-23T20:26:04Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:57:02 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:57:02Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2010 20:08:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-21T20:08:51Z">
p-y
</metadata>
</glsa>
diff --git a/glsa-201101-08.xml b/glsa-201101-08.xml
index c5337788..670d40df 100644
--- a/glsa-201101-08.xml
+++ b/glsa-201101-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-08">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 21, 2011</announced>
- <revised>January 21, 2011: 02</revised>
+ <announced>2011-01-21</announced>
+ <revised>2011-01-21: 02</revised>
<bug>336508</bug>
<bug>343091</bug>
<access>remote</access>
@@ -50,40 +49,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.4.1"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-21.html">APSB10-21</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-28.html">APSB10-28</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883">CVE-2010-2883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887">CVE-2010-2887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889">CVE-2010-2889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890">CVE-2010-2890</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619">CVE-2010-3619</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620">CVE-2010-3620</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621">CVE-2010-3621</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622">CVE-2010-3622</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625">CVE-2010-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626">CVE-2010-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627">CVE-2010-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628">CVE-2010-3628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629">CVE-2010-3629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630">CVE-2010-3630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632">CVE-2010-3632</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656">CVE-2010-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657">CVE-2010-3657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658">CVE-2010-3658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091">CVE-2010-4091</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-21.html">APSB10-21</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-28.html">APSB10-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883">CVE-2010-2883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887">CVE-2010-2887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889">CVE-2010-2889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890">CVE-2010-2890</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619">CVE-2010-3619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620">CVE-2010-3620</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621">CVE-2010-3621</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622">CVE-2010-3622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625">CVE-2010-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626">CVE-2010-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627">CVE-2010-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628">CVE-2010-3628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629">CVE-2010-3629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630">CVE-2010-3630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632">CVE-2010-3632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656">CVE-2010-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657">CVE-2010-3657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658">CVE-2010-3658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091">CVE-2010-4091</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Oct 2010 13:07:56 +0000">
+ <metadata tag="requester" timestamp="2010-10-11T13:07:56Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Jan 2011 16:33:24 +0000">
+ <metadata tag="submitter" timestamp="2011-01-15T16:33:24Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Jan 2011 16:35:28 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-15T16:35:28Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201101-09.xml b/glsa-201101-09.xml
index 5fe38f40..76184590 100644
--- a/glsa-201101-09.xml
+++ b/glsa-201101-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-09">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 21, 2011</announced>
- <revised>January 21, 2011: 01</revised>
+ <announced>2011-01-21</announced>
+ <revised>2011-01-21: 01</revised>
<bug>307749</bug>
<bug>322855</bug>
<bug>332205</bug>
@@ -54,78 +53,78 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.1.102.64&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.1.102.64"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-06.html">APSB10-06</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-22.html">APSB10-22</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-26.html">APSB10-26</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546">CVE-2008-4546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793">CVE-2009-3793</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187">CVE-2010-0187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209">CVE-2010-0209</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160">CVE-2010-2160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161">CVE-2010-2161</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162">CVE-2010-2162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163">CVE-2010-2163</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164">CVE-2010-2164</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165">CVE-2010-2165</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166">CVE-2010-2166</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167">CVE-2010-2167</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169">CVE-2010-2169</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170">CVE-2010-2170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171">CVE-2010-2171</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172">CVE-2010-2172</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173">CVE-2010-2173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174">CVE-2010-2174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175">CVE-2010-2175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176">CVE-2010-2176</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177">CVE-2010-2177</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178">CVE-2010-2178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179">CVE-2010-2179</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180">CVE-2010-2180</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181">CVE-2010-2181</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182">CVE-2010-2182</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183">CVE-2010-2183</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184">CVE-2010-2184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185">CVE-2010-2185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186">CVE-2010-2186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187">CVE-2010-2187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188">CVE-2010-2188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189">CVE-2010-2189</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213">CVE-2010-2213</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214">CVE-2010-2214</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215">CVE-2010-2215</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216">CVE-2010-2216</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636">CVE-2010-3636</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639">CVE-2010-3639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640">CVE-2010-3640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641">CVE-2010-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642">CVE-2010-3642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643">CVE-2010-3643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644">CVE-2010-3644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645">CVE-2010-3645</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646">CVE-2010-3646</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647">CVE-2010-3647</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648">CVE-2010-3648</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649">CVE-2010-3649</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650">CVE-2010-3650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652">CVE-2010-3652</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976">CVE-2010-3976</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-06.html">APSB10-06</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-22.html">APSB10-22</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-26.html">APSB10-26</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546">CVE-2008-4546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793">CVE-2009-3793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187">CVE-2010-0187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209">CVE-2010-0209</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160">CVE-2010-2160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161">CVE-2010-2161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162">CVE-2010-2162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163">CVE-2010-2163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164">CVE-2010-2164</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165">CVE-2010-2165</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166">CVE-2010-2166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167">CVE-2010-2167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169">CVE-2010-2169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170">CVE-2010-2170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171">CVE-2010-2171</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172">CVE-2010-2172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173">CVE-2010-2173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174">CVE-2010-2174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175">CVE-2010-2175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176">CVE-2010-2176</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177">CVE-2010-2177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178">CVE-2010-2178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179">CVE-2010-2179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180">CVE-2010-2180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181">CVE-2010-2181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182">CVE-2010-2182</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183">CVE-2010-2183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184">CVE-2010-2184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185">CVE-2010-2185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186">CVE-2010-2186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187">CVE-2010-2187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188">CVE-2010-2188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189">CVE-2010-2189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213">CVE-2010-2213</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214">CVE-2010-2214</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215">CVE-2010-2215</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216">CVE-2010-2216</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636">CVE-2010-3636</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639">CVE-2010-3639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640">CVE-2010-3640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641">CVE-2010-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642">CVE-2010-3642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643">CVE-2010-3643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644">CVE-2010-3644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645">CVE-2010-3645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646">CVE-2010-3646</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647">CVE-2010-3647</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648">CVE-2010-3648</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649">CVE-2010-3649</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650">CVE-2010-3650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652">CVE-2010-3652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976">CVE-2010-3976</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Aug 2010 07:58:07 +0000">
+ <metadata tag="requester" timestamp="2010-08-12T07:58:07Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Jan 2011 16:16:21 +0000">
+ <metadata tag="submitter" timestamp="2011-01-15T16:16:21Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Jan 2011 16:16:33 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-15T16:16:33Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-01.xml b/glsa-201110-01.xml
index 93b517a2..3cab9ddc 100644
--- a/glsa-201110-01.xml
+++ b/glsa-201110-01.xml
@@ -6,8 +6,8 @@
execution of arbitrary code and other attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 09, 2011</announced>
- <revised>June 06, 2015: 13</revised>
+ <announced>2011-10-09</announced>
+ <revised>2015-06-06: 13</revised>
<bug>303739</bug>
<bug>308011</bug>
<bug>322575</bug>
@@ -82,22 +82,22 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3245">CVE-2009-3245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4355">CVE-2009-4355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0433">CVE-2010-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0740">CVE-2010-0740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0742">CVE-2010-0742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1633">CVE-2010-1633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2939">CVE-2010-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3864">CVE-2010-3864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4180">CVE-2010-4180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4252">CVE-2010-4252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0014">CVE-2011-0014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3207">CVE-2011-3207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3210">CVE-2011-3210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3245">CVE-2009-3245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4355">CVE-2009-4355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0433">CVE-2010-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0740">CVE-2010-0740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0742">CVE-2010-0742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1633">CVE-2010-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2939">CVE-2010-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3864">CVE-2010-3864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4180">CVE-2010-4180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4252">CVE-2010-4252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0014">CVE-2011-0014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3207">CVE-2011-3207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3210">CVE-2011-3210</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:03 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:06:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:03Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:06:31Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-02.xml b/glsa-201110-02.xml
index ab8b75ce..e2e02831 100644
--- a/glsa-201110-02.xml
+++ b/glsa-201110-02.xml
@@ -6,8 +6,8 @@
execution of arbitrary code, or a Denial of Service condition.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>October 09, 2011</announced>
- <revised>October 09, 2011: 1</revised>
+ <announced>2011-10-09</announced>
+ <revised>2011-10-09: 1</revised>
<bug>323859</bug>
<bug>330479</bug>
<bug>339401</bug>
@@ -57,49 +57,49 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2283">CVE-2010-2283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2284">CVE-2010-2284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2285">CVE-2010-2285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2286">CVE-2010-2286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2287">CVE-2010-2287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2992">CVE-2010-2992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2993">CVE-2010-2993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2994">CVE-2010-2994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2995">CVE-2010-2995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3133">CVE-2010-3133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3445">CVE-2010-3445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4300">CVE-2010-4300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4301">CVE-2010-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4538">CVE-2010-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0024">CVE-2011-0024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0444">CVE-2011-0444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0445">CVE-2011-0445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0538">CVE-2011-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0713">CVE-2011-0713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1138">CVE-2011-1138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1139">CVE-2011-1139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1140">CVE-2011-1140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1141">CVE-2011-1141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1142">CVE-2011-1142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1143">CVE-2011-1143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590">CVE-2011-1590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591">CVE-2011-1591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592">CVE-2011-1592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956">CVE-2011-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1957">CVE-2011-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1958">CVE-2011-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1959">CVE-2011-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2174">CVE-2011-2174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2175">CVE-2011-2175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2597">CVE-2011-2597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2698">CVE-2011-2698</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3266">CVE-2011-3266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3360">CVE-2011-3360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3482">CVE-2011-3482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3483">CVE-2011-3483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2283">CVE-2010-2283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2284">CVE-2010-2284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2285">CVE-2010-2285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2286">CVE-2010-2286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2287">CVE-2010-2287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2992">CVE-2010-2992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2993">CVE-2010-2993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2994">CVE-2010-2994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2995">CVE-2010-2995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3133">CVE-2010-3133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3445">CVE-2010-3445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4300">CVE-2010-4300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4301">CVE-2010-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4538">CVE-2010-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0024">CVE-2011-0024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0444">CVE-2011-0444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0445">CVE-2011-0445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0538">CVE-2011-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0713">CVE-2011-0713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1138">CVE-2011-1138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1139">CVE-2011-1139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1140">CVE-2011-1140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1141">CVE-2011-1141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1142">CVE-2011-1142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1143">CVE-2011-1143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590">CVE-2011-1590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591">CVE-2011-1591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592">CVE-2011-1592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956">CVE-2011-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1957">CVE-2011-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1958">CVE-2011-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1959">CVE-2011-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2174">CVE-2011-2174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2175">CVE-2011-2175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2597">CVE-2011-2597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2698">CVE-2011-2698</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3266">CVE-2011-3266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3360">CVE-2011-3360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3482">CVE-2011-3482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3483">CVE-2011-3483</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:44 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:44Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 09 Oct 2011 15:48:24 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-09T15:48:24Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201110-03.xml b/glsa-201110-03.xml
index 2ebd383b..ba155a6d 100644
--- a/glsa-201110-03.xml
+++ b/glsa-201110-03.xml
@@ -6,8 +6,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>352781</bug>
<bug>380255</bug>
<bug>386203</bug>
@@ -55,27 +55,27 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761">CVE-2010-2761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172">CVE-2010-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764">CVE-2010-3764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411">CVE-2010-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567">CVE-2010-4567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568">CVE-2010-4568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569">CVE-2010-4569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570">CVE-2010-4570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572">CVE-2010-4572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046">CVE-2011-0046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048">CVE-2011-0048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379">CVE-2011-2379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380">CVE-2011-2380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381">CVE-2011-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976">CVE-2011-2976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977">CVE-2011-2977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978">CVE-2011-2978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979">CVE-2011-2979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761">CVE-2010-2761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172">CVE-2010-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764">CVE-2010-3764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411">CVE-2010-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567">CVE-2010-4567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568">CVE-2010-4568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569">CVE-2010-4569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570">CVE-2010-4570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572">CVE-2010-4572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046">CVE-2011-0046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048">CVE-2011-0048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379">CVE-2011-2379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380">CVE-2011-2380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381">CVE-2011-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976">CVE-2011-2976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977">CVE-2011-2977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978">CVE-2011-2978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979">CVE-2011-2979</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 21:15:32 +0000" tag="requester">
+ <metadata timestamp="2011-10-08T21:15:32Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 19:51:47 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-10T19:51:47Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201110-04.xml b/glsa-201110-04.xml
index 16873863..320c5296 100644
--- a/glsa-201110-04.xml
+++ b/glsa-201110-04.xml
@@ -6,8 +6,8 @@
allowing for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Dovecot</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 2</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 2</revised>
<bug>286844</bug>
<bug>293954</bug>
<bug>314533</bug>
@@ -61,18 +61,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235">CVE-2009-3235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897">CVE-2009-3897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745">CVE-2010-0745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304">CVE-2010-3304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706">CVE-2010-3706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707">CVE-2010-3707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779">CVE-2010-3779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780">CVE-2010-3780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929">CVE-2011-1929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166">CVE-2011-2166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167">CVE-2011-2167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235">CVE-2009-3235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897">CVE-2009-3897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745">CVE-2010-0745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304">CVE-2010-3304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706">CVE-2010-3706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707">CVE-2010-3707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779">CVE-2010-3779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780">CVE-2010-3780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929">CVE-2011-1929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166">CVE-2011-2166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167">CVE-2011-2167</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:19 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:22:02 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:19Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T20:22:02Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201110-05.xml b/glsa-201110-05.xml
index 538cbd75..e2b8bcb9 100644
--- a/glsa-201110-05.xml
+++ b/glsa-201110-05.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>281224</bug>
<bug>292025</bug>
<access>remote</access>
@@ -52,13 +52,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:18 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:18Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:33:39 +0000" tag="submitter">
+ <metadata timestamp="2011-10-10T20:33:39Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-06.xml b/glsa-201110-06.xml
index 47771f87..142e2623 100644
--- a/glsa-201110-06.xml
+++ b/glsa-201110-06.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 2</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 2</revised>
<bug>306939</bug>
<bug>332039</bug>
<bug>340807</bug>
@@ -59,75 +59,75 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7243">CVE-2006-7243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5016">CVE-2009-5016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1128">CVE-2010-1128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1129">CVE-2010-1129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1130">CVE-2010-1130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1860">CVE-2010-1860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1861">CVE-2010-1861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1862">CVE-2010-1862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1864">CVE-2010-1864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1866">CVE-2010-1866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1868">CVE-2010-1868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1914">CVE-2010-1914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1915">CVE-2010-1915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1917">CVE-2010-1917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2093">CVE-2010-2093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2094">CVE-2010-2094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2097">CVE-2010-2097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2100">CVE-2010-2100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2101">CVE-2010-2101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2190">CVE-2010-2190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2191">CVE-2010-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2225">CVE-2010-2225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2484">CVE-2010-2484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2531">CVE-2010-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2950">CVE-2010-2950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3062">CVE-2010-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3063">CVE-2010-3063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3064">CVE-2010-3064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3065">CVE-2010-3065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3436">CVE-2010-3436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3870">CVE-2010-3870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4150">CVE-2010-4150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4409">CVE-2010-4409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4645">CVE-2010-4645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4697">CVE-2010-4697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4698">CVE-2010-4698</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4699">CVE-2010-4699</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4700">CVE-2010-4700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0420">CVE-2011-0420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0421">CVE-2011-0421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0708">CVE-2011-0708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0752">CVE-2011-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0753">CVE-2011-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0755">CVE-2011-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1092">CVE-2011-1092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1148">CVE-2011-1148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1153">CVE-2011-1153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1464">CVE-2011-1464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1466">CVE-2011-1466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1467">CVE-2011-1467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1468">CVE-2011-1468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1469">CVE-2011-1469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1470">CVE-2011-1470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1471">CVE-2011-1471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1657">CVE-2011-1657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1938">CVE-2011-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2202">CVE-2011-2202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3182">CVE-2011-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3189">CVE-2011-3189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3267">CVE-2011-3267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3268">CVE-2011-3268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7243">CVE-2006-7243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5016">CVE-2009-5016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1128">CVE-2010-1128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1129">CVE-2010-1129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1130">CVE-2010-1130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1860">CVE-2010-1860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1861">CVE-2010-1861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1862">CVE-2010-1862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1864">CVE-2010-1864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1866">CVE-2010-1866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1868">CVE-2010-1868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1914">CVE-2010-1914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1915">CVE-2010-1915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1917">CVE-2010-1917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2093">CVE-2010-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2094">CVE-2010-2094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2097">CVE-2010-2097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2100">CVE-2010-2100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2101">CVE-2010-2101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2190">CVE-2010-2190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2191">CVE-2010-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2225">CVE-2010-2225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2484">CVE-2010-2484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2531">CVE-2010-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2950">CVE-2010-2950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3062">CVE-2010-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3063">CVE-2010-3063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3064">CVE-2010-3064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3065">CVE-2010-3065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3436">CVE-2010-3436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3870">CVE-2010-3870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4150">CVE-2010-4150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4409">CVE-2010-4409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4645">CVE-2010-4645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4697">CVE-2010-4697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4698">CVE-2010-4698</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4699">CVE-2010-4699</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4700">CVE-2010-4700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0420">CVE-2011-0420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0421">CVE-2011-0421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0708">CVE-2011-0708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0752">CVE-2011-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0753">CVE-2011-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0755">CVE-2011-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1092">CVE-2011-1092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1148">CVE-2011-1148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1153">CVE-2011-1153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1464">CVE-2011-1464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1466">CVE-2011-1466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1467">CVE-2011-1467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1468">CVE-2011-1468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1469">CVE-2011-1469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1470">CVE-2011-1470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1471">CVE-2011-1471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1657">CVE-2011-1657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1938">CVE-2011-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2202">CVE-2011-2202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3182">CVE-2011-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3189">CVE-2011-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3267">CVE-2011-3267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3268">CVE-2011-3268</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 21:51:57 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T21:51:57Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-07.xml b/glsa-201110-07.xml
index f55107bc..3439824d 100644
--- a/glsa-201110-07.xml
+++ b/glsa-201110-07.xml
@@ -4,8 +4,8 @@
<title>vsftpd: Denial of Service</title>
<synopsis>A Denial of Service vulnerability was found in vsftpd.</synopsis>
<product type="ebuild">vsftpd</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>357001</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0762">CVE-2011-0762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0762">CVE-2011-0762</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 21:54:37 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:41:01 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T21:54:37Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T20:41:01Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-08.xml b/glsa-201110-08.xml
index 25dd4f4f..bdeec1f2 100644
--- a/glsa-201110-08.xml
+++ b/glsa-201110-08.xml
@@ -6,8 +6,8 @@
leading to remote passive code execution.
</synopsis>
<product type="ebuild">feh</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 2</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 2</revised>
<bug>325531</bug>
<bug>354063</bug>
<access>local, remote</access>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2246">CVE-2010-2246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0702">CVE-2011-0702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1031">CVE-2011-1031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2246">CVE-2010-2246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0702">CVE-2011-0702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1031">CVE-2011-1031</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:47 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 21:10:09 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:47Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-13T21:10:09Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201110-09.xml b/glsa-201110-09.xml
index f9603ed8..6b7b581e 100644
--- a/glsa-201110-09.xml
+++ b/glsa-201110-09.xml
@@ -4,8 +4,8 @@
<title>Conky: Privilege escalation</title>
<synopsis>A privilege escalation vulnerability was found in Conky.</synopsis>
<product type="ebuild">Conky</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>354061</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3616">CVE-2011-3616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3616">CVE-2011-3616</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:34:39 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 21:46:29 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:34:39Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-13T21:46:29Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-10.xml b/glsa-201110-10.xml
index 35c0048a..035e1b83 100644
--- a/glsa-201110-10.xml
+++ b/glsa-201110-10.xml
@@ -6,8 +6,8 @@
or overwriting of local files.
</synopsis>
<product type="ebuild">Wget</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>329941</bug>
<access>remote</access>
<affected>
@@ -51,12 +51,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2252">CVE-2010-2252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2252">CVE-2010-2252</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:55 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:55Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 23:47:06 +0000" tag="submitter">
+ <metadata timestamp="2011-10-13T23:47:06Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-11.xml b/glsa-201110-11.xml
index 08494b19..ec671adc 100644
--- a/glsa-201110-11.xml
+++ b/glsa-201110-11.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>354207</bug>
<bug>359019</bug>
<bug>363179</bug>
@@ -54,19 +54,19 @@
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/advisories/apsa11-01.html">
+ <uri link="https://www.adobe.com/support/security/advisories/apsa11-01.html">
APSA11-01
</uri>
- <uri link="http://www.adobe.com/support/security/advisories/apsa11-02.html">
+ <uri link="https://www.adobe.com/support/security/advisories/apsa11-02.html">
APSA11-02
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-02.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-02.html">
APSB11-02
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-12.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-12.html">
APSB11-12
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-13.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-13.html">
APSB11-13
</uri>
<uri link="https://www.adobe.com/support/security/bulletins/apsb11-21.html">
@@ -75,61 +75,61 @@
<uri link="https://www.adobe.com/support/security/bulletins/apsb11-26.html">
APSB11-26
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558">CVE-2011-0558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559">CVE-2011-0559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560">CVE-2011-0560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561">CVE-2011-0561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571">CVE-2011-0571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572">CVE-2011-0572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573">CVE-2011-0573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574">CVE-2011-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575">CVE-2011-0575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577">CVE-2011-0577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578">CVE-2011-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579">CVE-2011-0579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607">CVE-2011-0607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608">CVE-2011-0608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609">CVE-2011-0609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611">CVE-2011-0611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618">CVE-2011-0618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619">CVE-2011-0619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620">CVE-2011-0620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621">CVE-2011-0621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622">CVE-2011-0622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623">CVE-2011-0623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624">CVE-2011-0624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625">CVE-2011-0625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626">CVE-2011-0626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627">CVE-2011-0627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628">CVE-2011-0628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107">CVE-2011-2107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110">CVE-2011-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2426">CVE-2011-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2427">CVE-2011-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2428">CVE-2011-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2429">CVE-2011-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2430">CVE-2011-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2444">CVE-2011-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558">CVE-2011-0558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559">CVE-2011-0559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560">CVE-2011-0560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561">CVE-2011-0561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571">CVE-2011-0571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572">CVE-2011-0572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573">CVE-2011-0573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574">CVE-2011-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575">CVE-2011-0575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577">CVE-2011-0577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578">CVE-2011-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579">CVE-2011-0579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607">CVE-2011-0607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608">CVE-2011-0608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609">CVE-2011-0609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611">CVE-2011-0611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618">CVE-2011-0618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619">CVE-2011-0619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620">CVE-2011-0620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621">CVE-2011-0621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622">CVE-2011-0622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623">CVE-2011-0623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624">CVE-2011-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625">CVE-2011-0625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626">CVE-2011-0626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627">CVE-2011-0627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628">CVE-2011-0628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107">CVE-2011-2107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110">CVE-2011-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2426">CVE-2011-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2427">CVE-2011-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2428">CVE-2011-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2429">CVE-2011-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2430">CVE-2011-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2444">CVE-2011-2444</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:02 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:02Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 23:52:05 +0000" tag="submitter">
+ <metadata timestamp="2011-10-13T23:52:05Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-12.xml b/glsa-201110-12.xml
index 88fc4275..623c5f64 100644
--- a/glsa-201110-12.xml
+++ b/glsa-201110-12.xml
@@ -4,8 +4,8 @@
<title>Unbound: Denial of Service</title>
<synopsis>Multiple Denial of Service vulnerabilities were found in Unbound.</synopsis>
<product type="ebuild">unbound</product>
- <announced>October 15, 2011</announced>
- <revised>October 15, 2011: 1</revised>
+ <announced>2011-10-15</announced>
+ <revised>2011-10-15: 1</revised>
<bug>309117</bug>
<bug>368981</bug>
<access>remote</access>
@@ -39,11 +39,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0969">CVE-2010-0969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1922">CVE-2011-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0969">CVE-2010-0969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1922">CVE-2011-1922</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:09:43 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 15 Oct 2011 09:21:34 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:09:43Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-15T09:21:34Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-13.xml b/glsa-201110-13.xml
index 715f7917..855fb3e4 100644
--- a/glsa-201110-13.xml
+++ b/glsa-201110-13.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>October 18, 2011</announced>
- <revised>October 18, 2011: 1</revised>
+ <announced>2011-10-18</announced>
+ <revised>2011-10-18: 1</revised>
<bug>351920</bug>
<bug>359789</bug>
<access>remote</access>
@@ -49,19 +49,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015">CVE-2011-0015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016">CVE-2011-0016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427">CVE-2011-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490">CVE-2011-0490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491">CVE-2011-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492">CVE-2011-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493">CVE-2011-0493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924">CVE-2011-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015">CVE-2011-0015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016">CVE-2011-0016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427">CVE-2011-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490">CVE-2011-0490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491">CVE-2011-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492">CVE-2011-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493">CVE-2011-0493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924">CVE-2011-1924</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 18 Oct 2011 18:25:47 +0000" tag="submitter">
+ <metadata timestamp="2011-10-18T18:25:47Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-14.xml b/glsa-201110-14.xml
index 2cce3fea..8a279cb9 100644
--- a/glsa-201110-14.xml
+++ b/glsa-201110-14.xml
@@ -6,8 +6,8 @@
allowing for a symlink attack.
</synopsis>
<product type="ebuild">D-Bus</product>
- <announced>October 21, 2011</announced>
- <revised>October 21, 2011: 1</revised>
+ <announced>2011-10-21</announced>
+ <revised>2011-10-21: 1</revised>
<bug>348766</bug>
<bug>371261</bug>
<bug>372743</bug>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4352">CVE-2010-4352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2200">CVE-2011-2200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2533">CVE-2011-2533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4352">CVE-2010-4352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2200">CVE-2011-2200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2533">CVE-2011-2533</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:28 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:28Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 21 Oct 2011 21:15:45 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-21T21:15:45Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201110-15.xml b/glsa-201110-15.xml
index e025ccad..a8c43777 100644
--- a/glsa-201110-15.xml
+++ b/glsa-201110-15.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">GnuPG</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>329583</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2547">CVE-2010-2547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2547">CVE-2010-2547</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:19 +0000" tag="requester">system</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 04:24:43 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:38:19Z" tag="requester">system</metadata>
+ <metadata timestamp="2011-10-22T04:24:43Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-16.xml b/glsa-201110-16.xml
index ace2f481..db5aa72b 100644
--- a/glsa-201110-16.xml
+++ b/glsa-201110-16.xml
@@ -7,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">Cyrus IMAP Server</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>283596</bug>
<bug>382349</bug>
<bug>385729</bug>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2632">CVE-2009-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3208">CVE-2011-3208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3481">CVE-2011-3481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2632">CVE-2009-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3208">CVE-2011-3208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3481">CVE-2011-3481</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:12 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 04:32:26 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:12Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2011-10-22T04:32:26Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-17.xml b/glsa-201110-17.xml
index 07e0ad35..4358fcc6 100644
--- a/glsa-201110-17.xml
+++ b/glsa-201110-17.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>335885</bug>
<bug>355583</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2244">CVE-2010-2244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1002">CVE-2011-1002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2244">CVE-2010-2244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1002">CVE-2011-1002</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:46:40 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 16:30:30 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:46:40Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-22T16:30:30Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-18.xml b/glsa-201110-18.xml
index 71fbdbb2..8b3cd071 100644
--- a/glsa-201110-18.xml
+++ b/glsa-201110-18.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">rgmanager</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>352213</bug>
<access>local</access>
<affected>
@@ -41,10 +41,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:41:31 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 16:33:13 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:41:31Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-22T16:33:13Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201110-19.xml b/glsa-201110-19.xml
index 7045319f..c9a960b5 100644
--- a/glsa-201110-19.xml
+++ b/glsa-201110-19.xml
@@ -6,8 +6,8 @@
attackers to disclose information.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 2</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 2</revised>
<bug>387069</bug>
<access>local</access>
<affected>
@@ -63,9 +63,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4028">CVE-2011-4028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4029">CVE-2011-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4028">CVE-2011-4028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4029">CVE-2011-4029</uri>
</references>
- <metadata timestamp="Thu, 13 Oct 2011 20:53:51 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 17:19:57 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-13T20:53:51Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2011-10-22T17:19:57Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201110-20.xml b/glsa-201110-20.xml
index 06072f69..26a7cfa3 100644
--- a/glsa-201110-20.xml
+++ b/glsa-201110-20.xml
@@ -6,8 +6,8 @@
severe of which may allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">Clam AntiVirus</product>
- <announced>October 24, 2011</announced>
- <revised>October 24, 2011: 2</revised>
+ <announced>2011-10-24</announced>
+ <revised>2011-10-24: 2</revised>
<bug>338226</bug>
<bug>347627</bug>
<bug>354019</bug>
@@ -48,19 +48,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3434">CVE-2010-3434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4260">CVE-2010-4260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4261">CVE-2010-4261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4479">CVE-2010-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1003">CVE-2011-1003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2721">CVE-2011-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3627">CVE-2011-3627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3434">CVE-2010-3434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4260">CVE-2010-4260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4261">CVE-2010-4261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4479">CVE-2010-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1003">CVE-2011-1003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2721">CVE-2011-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3627">CVE-2011-3627</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 24 Oct 2011 15:40:45 +0000" tag="submitter">
+ <metadata timestamp="2011-10-24T15:40:45Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-21.xml b/glsa-201110-21.xml
index ca52cbfb..72feb09f 100644
--- a/glsa-201110-21.xml
+++ b/glsa-201110-21.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>October 24, 2011</announced>
- <revised>October 24, 2011: 1</revised>
+ <announced>2011-10-24</announced>
+ <revised>2011-10-24: 1</revised>
<bug>352059</bug>
<bug>355967</bug>
<bug>359767</bug>
@@ -55,22 +55,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1147">CVE-2011-1147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1174">CVE-2011-1174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1175">CVE-2011-1175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1507">CVE-2011-1507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1599">CVE-2011-1599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2529">CVE-2011-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2535">CVE-2011-2535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2536">CVE-2011-2536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2665">CVE-2011-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2666">CVE-2011-2666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4063">CVE-2011-4063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1147">CVE-2011-1147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1174">CVE-2011-1174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1175">CVE-2011-1175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1507">CVE-2011-1507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1599">CVE-2011-1599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2529">CVE-2011-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2535">CVE-2011-2535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2536">CVE-2011-2536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2665">CVE-2011-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2666">CVE-2011-2666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4063">CVE-2011-4063</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:05 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:05Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 24 Oct 2011 18:44:10 +0000" tag="submitter">
+ <metadata timestamp="2011-10-24T18:44:10Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-22.xml b/glsa-201110-22.xml
index 9e185314..4b0dc062 100644
--- a/glsa-201110-22.xml
+++ b/glsa-201110-22.xml
@@ -7,8 +7,8 @@
arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">postgresql-server postgresql-base</product>
- <announced>October 25, 2011</announced>
- <revised>March 05, 2012: 3</revised>
+ <announced>2011-10-25</announced>
+ <revised>2012-03-05: 3</revised>
<bug>261223</bug>
<bug>284274</bug>
<bug>297383</bug>
@@ -156,24 +156,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0922">CVE-2009-0922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3229">CVE-2009-3229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3230">CVE-2009-3230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3231">CVE-2009-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4034">CVE-2009-4034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4136">CVE-2009-4136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0442">CVE-2010-0442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0733">CVE-2010-0733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1169">CVE-2010-1169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1170">CVE-2010-1170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1447">CVE-2010-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1975">CVE-2010-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3433">CVE-2010-3433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4015">CVE-2010-4015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0922">CVE-2009-0922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3229">CVE-2009-3229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3230">CVE-2009-3230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3231">CVE-2009-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4034">CVE-2009-4034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4136">CVE-2009-4136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0442">CVE-2010-0442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0733">CVE-2010-0733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1169">CVE-2010-1169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1170">CVE-2010-1170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1447">CVE-2010-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1975">CVE-2010-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3433">CVE-2010-3433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4015">CVE-2010-4015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:07Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 05 Mar 2012 19:10:41 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-03-05T19:10:41Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201110-23.xml b/glsa-201110-23.xml
index 35d3593a..343fe498 100644
--- a/glsa-201110-23.xml
+++ b/glsa-201110-23.xml
@@ -6,8 +6,8 @@
attacker to conduct SQL injection.
</synopsis>
<product type="ebuild">mod_authnz_external</product>
- <announced>October 25, 2011</announced>
- <revised>October 25, 2011: 1</revised>
+ <announced>2011-10-25</announced>
+ <revised>2011-10-25: 1</revised>
<bug>386165</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2688">CVE-2011-2688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2688">CVE-2011-2688</uri>
</references>
- <metadata timestamp="Tue, 18 Oct 2011 14:42:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-18T14:42:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 25 Oct 2011 17:13:58 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-25T17:13:58Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201110-24.xml b/glsa-201110-24.xml
index aea4aecc..cd3b2aa3 100644
--- a/glsa-201110-24.xml
+++ b/glsa-201110-24.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>279379</bug>
<bug>279380</bug>
<bug>301828</bug>
@@ -51,17 +51,17 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2621">CVE-2009-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2622">CVE-2009-2622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2855">CVE-2009-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0308">CVE-2010-0308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0639">CVE-2010-0639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2951">CVE-2010-2951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3072">CVE-2010-3072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3205">CVE-2011-3205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2621">CVE-2009-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2622">CVE-2009-2622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2855">CVE-2009-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0308">CVE-2010-0308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0639">CVE-2010-0639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2951">CVE-2010-2951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3072">CVE-2010-3072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3205">CVE-2011-3205</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:54 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:47:18 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:54Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-26T20:47:18Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-25.xml b/glsa-201110-25.xml
index 076c4bdb..d8c25285 100644
--- a/glsa-201110-25.xml
+++ b/glsa-201110-25.xml
@@ -6,8 +6,8 @@
to inject FTP commands or cause a Denial of Service.
</synopsis>
<product type="ebuild">Pure-FTPd</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>358375</bug>
<bug>365751</bug>
<access>remote</access>
@@ -49,13 +49,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0418">CVE-2011-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1575">CVE-2011-1575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0418">CVE-2011-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1575">CVE-2011-1575</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:42 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:42Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:49:23 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T20:49:23Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201110-26.xml b/glsa-201110-26.xml
index f1ea0c05..31f30d60 100644
--- a/glsa-201110-26.xml
+++ b/glsa-201110-26.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>345555</bug>
<bug>370715</bug>
<bug>386985</bug>
@@ -44,16 +44,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4008">CVE-2010-4008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4494">CVE-2010-4494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1944">CVE-2011-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2821">CVE-2011-2821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4008">CVE-2010-4008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4494">CVE-2010-4494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1944">CVE-2011-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2821">CVE-2011-2821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:45 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:45Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:50:29 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T20:50:29Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201111-01.xml b/glsa-201111-01.xml
index 82a5ddb4..c4ecff3b 100644
--- a/glsa-201111-01.xml
+++ b/glsa-201111-01.xml
@@ -7,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>November 01, 2011</announced>
- <revised>November 01, 2011: 1</revised>
+ <announced>2011-11-01</announced>
+ <revised>2011-11-01: 1</revised>
<bug>351525</bug>
<bug>353626</bug>
<bug>354121</bug>
@@ -88,123 +88,123 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345">CVE-2011-2345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346">CVE-2011-2346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347">CVE-2011-2347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348">CVE-2011-2348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349">CVE-2011-2349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350">CVE-2011-2350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351">CVE-2011-2351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835">CVE-2011-2835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837">CVE-2011-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838">CVE-2011-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839">CVE-2011-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840">CVE-2011-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841">CVE-2011-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843">CVE-2011-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844">CVE-2011-2844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845">CVE-2011-2845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846">CVE-2011-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847">CVE-2011-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848">CVE-2011-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849">CVE-2011-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850">CVE-2011-2850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851">CVE-2011-2851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852">CVE-2011-2852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853">CVE-2011-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854">CVE-2011-2854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855">CVE-2011-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856">CVE-2011-2856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857">CVE-2011-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858">CVE-2011-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859">CVE-2011-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860">CVE-2011-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861">CVE-2011-2861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862">CVE-2011-2862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864">CVE-2011-2864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874">CVE-2011-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234">CVE-2011-3234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873">CVE-2011-3873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875">CVE-2011-3875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876">CVE-2011-3876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877">CVE-2011-3877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878">CVE-2011-3878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879">CVE-2011-3879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880">CVE-2011-3880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881">CVE-2011-3881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882">CVE-2011-3882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883">CVE-2011-3883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884">CVE-2011-3884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885">CVE-2011-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886">CVE-2011-3886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887">CVE-2011-3887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888">CVE-2011-3888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889">CVE-2011-3889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890">CVE-2011-3890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891">CVE-2011-3891</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345">CVE-2011-2345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346">CVE-2011-2346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347">CVE-2011-2347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348">CVE-2011-2348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349">CVE-2011-2349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350">CVE-2011-2350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351">CVE-2011-2351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835">CVE-2011-2835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837">CVE-2011-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838">CVE-2011-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839">CVE-2011-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840">CVE-2011-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841">CVE-2011-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843">CVE-2011-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844">CVE-2011-2844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845">CVE-2011-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846">CVE-2011-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847">CVE-2011-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848">CVE-2011-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849">CVE-2011-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850">CVE-2011-2850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851">CVE-2011-2851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852">CVE-2011-2852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853">CVE-2011-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854">CVE-2011-2854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855">CVE-2011-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856">CVE-2011-2856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857">CVE-2011-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858">CVE-2011-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859">CVE-2011-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860">CVE-2011-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861">CVE-2011-2861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862">CVE-2011-2862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864">CVE-2011-2864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874">CVE-2011-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234">CVE-2011-3234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873">CVE-2011-3873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875">CVE-2011-3875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876">CVE-2011-3876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877">CVE-2011-3877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878">CVE-2011-3878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879">CVE-2011-3879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880">CVE-2011-3880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881">CVE-2011-3881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882">CVE-2011-3882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883">CVE-2011-3883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884">CVE-2011-3884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885">CVE-2011-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886">CVE-2011-3886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887">CVE-2011-3887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888">CVE-2011-3888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889">CVE-2011-3889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890">CVE-2011-3890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891">CVE-2011-3891</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html">
Release Notes 10.0.648.127
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html">
Release Notes 10.0.648.133
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html">
Release Notes 10.0.648.205
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html">
Release Notes 11.0.696.57
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html">
Release Notes 11.0.696.65
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html">
Release Notes 11.0.696.68
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html">
Release Notes 11.0.696.71
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html">
Release Notes 12.0.742.112
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html">
Release Notes 12.0.742.91
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html">
Release Notes 13.0.782.107
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html">
Release Notes 13.0.782.215
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html">
Release Notes 13.0.782.220
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html">
Release Notes 14.0.835.163
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html">
Release Notes 14.0.835.202
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">
Release Notes 15.0.874.102
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html">
Release Notes 8.0.552.237
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html">
Release Notes 9.0.597.107
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html">
Release Notes 9.0.597.84
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html">
Release Notes 9.0.597.94
</uri>
</references>
- <metadata timestamp="Wed, 26 Oct 2011 07:38:36 +0000" tag="requester">
+ <metadata timestamp="2011-10-26T07:38:36Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 01 Nov 2011 09:59:26 +0000" tag="submitter">
+ <metadata timestamp="2011-11-01T09:59:26Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201111-02.xml b/glsa-201111-02.xml
index 15bf9f07..1ef3ecb9 100644
--- a/glsa-201111-02.xml
+++ b/glsa-201111-02.xml
@@ -6,8 +6,8 @@
allowing attackers to cause unspecified impact.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java</product>
- <announced>November 05, 2011</announced>
- <revised>November 05, 2011: 1</revised>
+ <announced>2011-11-05</announced>
+ <revised>2011-11-05: 1</revised>
<bug>340421</bug>
<bug>354213</bug>
<bug>370559</bug>
@@ -80,90 +80,90 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550">CVE-2010-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552">CVE-2010-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555">CVE-2010-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556">CVE-2010-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558">CVE-2010-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559">CVE-2010-3559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560">CVE-2010-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563">CVE-2010-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570">CVE-2010-3570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571">CVE-2010-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572">CVE-2010-3572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422">CVE-2010-4422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447">CVE-2010-4447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451">CVE-2010-4451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452">CVE-2010-4452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454">CVE-2010-4454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462">CVE-2010-4462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463">CVE-2010-4463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466">CVE-2010-4466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468">CVE-2010-4468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473">CVE-2010-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474">CVE-2010-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475">CVE-2010-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802">CVE-2011-0802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814">CVE-2011-0814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863">CVE-2011-0863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867">CVE-2011-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873">CVE-2011-0873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516">CVE-2011-3516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545">CVE-2011-3545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546">CVE-2011-3546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549">CVE-2011-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550">CVE-2011-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555">CVE-2011-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561">CVE-2011-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550">CVE-2010-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552">CVE-2010-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555">CVE-2010-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556">CVE-2010-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558">CVE-2010-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559">CVE-2010-3559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560">CVE-2010-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563">CVE-2010-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570">CVE-2010-3570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571">CVE-2010-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572">CVE-2010-3572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422">CVE-2010-4422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447">CVE-2010-4447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451">CVE-2010-4451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452">CVE-2010-4452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454">CVE-2010-4454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462">CVE-2010-4462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463">CVE-2010-4463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466">CVE-2010-4466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468">CVE-2010-4468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473">CVE-2010-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474">CVE-2010-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475">CVE-2010-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802">CVE-2011-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814">CVE-2011-0814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863">CVE-2011-0863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867">CVE-2011-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873">CVE-2011-0873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516">CVE-2011-3516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545">CVE-2011-3545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546">CVE-2011-3546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549">CVE-2011-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550">CVE-2011-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555">CVE-2011-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561">CVE-2011-3561</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:14 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:14Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sat, 05 Nov 2011 10:22:49 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-11-05T10:22:49Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201111-03.xml b/glsa-201111-03.xml
index 4af34947..e9068054 100644
--- a/glsa-201111-03.xml
+++ b/glsa-201111-03.xml
@@ -6,8 +6,8 @@
execution of arbitrary code, a Denial of Service, or privilege escalation.
</synopsis>
<product type="ebuild">ebuild OpenTTD</product>
- <announced>November 11, 2011</announced>
- <revised>November 11, 2011: 2</revised>
+ <announced>2011-11-11</announced>
+ <revised>2011-11-11: 2</revised>
<bug>381799</bug>
<access>local, remote</access>
<affected>
@@ -47,13 +47,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4168">CVE-2010-4168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3341">CVE-2011-3341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3342">CVE-2011-3342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3343">CVE-2011-3343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4168">CVE-2010-4168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3341">CVE-2011-3341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3342">CVE-2011-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3343">CVE-2011-3343</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 11 Nov 2011 22:08:46 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-11T22:08:46Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-04.xml b/glsa-201111-04.xml
index b5e86a78..3d13a928 100644
--- a/glsa-201111-04.xml
+++ b/glsa-201111-04.xml
@@ -6,8 +6,8 @@
flaw, allowing attackers to call arbitrary PHP functions.
</synopsis>
<product type="ebuild">PhpDocumentor</product>
- <announced>November 11, 2011</announced>
- <revised>November 11, 2011: 1</revised>
+ <announced>2011-11-11</announced>
+ <revised>2011-11-11: 1</revised>
<bug>213318</bug>
<access>remote</access>
<affected>
@@ -48,12 +48,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1066">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1066">
CVE-2008-1066
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:01 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:01Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 11 Nov 2011 22:11:04 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-11T22:11:04Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-05.xml b/glsa-201111-05.xml
index 8d9f241b..1c90bff8 100644
--- a/glsa-201111-05.xml
+++ b/glsa-201111-05.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>November 19, 2011</announced>
- <revised>November 19, 2011: 1</revised>
+ <announced>2011-11-19</announced>
+ <revised>2011-11-19: 1</revised>
<bug>390113</bug>
<bug>390779</bug>
<access>remote</access>
@@ -60,41 +60,41 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3892">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3892">
CVE-2011-3892
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3893">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3893">
CVE-2011-3893
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3894">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3894">
CVE-2011-3894
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3895">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3895">
CVE-2011-3895
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3896">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3896">
CVE-2011-3896
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3897">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3897">
CVE-2011-3897
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3898">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3898">
CVE-2011-3898
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3900">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3900">
CVE-2011-3900
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html">
Release Notes 15.0.874.120
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/11/stable-channel-update_16.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/11/stable-channel-update_16.html">
Release Notes 15.0.874.121
</uri>
</references>
- <metadata timestamp="Fri, 11 Nov 2011 12:00:45 +0000" tag="requester">
+ <metadata timestamp="2011-11-11T12:00:45Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 19 Nov 2011 16:24:27 +0000" tag="submitter">
+ <metadata timestamp="2011-11-19T16:24:27Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201111-06.xml b/glsa-201111-06.xml
index c005e671..ed36e3e1 100644
--- a/glsa-201111-06.xml
+++ b/glsa-201111-06.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">MaraDNS</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>352569</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520">CVE-2011-0520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520">CVE-2011-0520</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:41 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:41Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-07.xml b/glsa-201111-07.xml
index 9effd86f..1eb6ced9 100644
--- a/glsa-201111-07.xml
+++ b/glsa-201111-07.xml
@@ -7,8 +7,8 @@
of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">TinTin++</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>209903</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0671">CVE-2008-0671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0672">CVE-2008-0672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0673">CVE-2008-0673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0671">CVE-2008-0671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0672">CVE-2008-0672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0673">CVE-2008-0673</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">system</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:45 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">system</metadata>
+ <metadata timestamp="2011-11-20T17:56:45Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-08.xml b/glsa-201111-08.xml
index f53a0b6a..0d8c0c1d 100644
--- a/glsa-201111-08.xml
+++ b/glsa-201111-08.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">radvd</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>385967</bug>
<access>local, remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601">CVE-2011-3601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602">CVE-2011-3602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603">CVE-2011-3603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604">CVE-2011-3604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605">CVE-2011-3605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601">CVE-2011-3601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602">CVE-2011-3602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603">CVE-2011-3603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604">CVE-2011-3604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605">CVE-2011-3605</uri>
</references>
- <metadata timestamp="Thu, 10 Nov 2011 10:43:03 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:48 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-10T10:43:03Z" tag="requester">ago</metadata>
+ <metadata timestamp="2011-11-20T17:56:48Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-09.xml b/glsa-201111-09.xml
index 36aa682d..e683973b 100644
--- a/glsa-201111-09.xml
+++ b/glsa-201111-09.xml
@@ -7,8 +7,8 @@
compartment.
</synopsis>
<product type="ebuild">Safe</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>325563</bug>
<access>remote</access>
<affected>
@@ -66,10 +66,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1168">CVE-2010-1168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1168">CVE-2010-1168</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-10.xml b/glsa-201111-10.xml
index a070ec0d..489ece23 100644
--- a/glsa-201111-10.xml
+++ b/glsa-201111-10.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">evince</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>350681</bug>
<bug>363447</bug>
<access>remote</access>
@@ -51,13 +51,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2640">CVE-2010-2640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2641">CVE-2010-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2643">CVE-2010-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2640">CVE-2010-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2641">CVE-2010-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2643">CVE-2010-2643</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:07Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:53 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:53Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-11.xml b/glsa-201111-11.xml
index 4b3579d8..02c9444a 100644
--- a/glsa-201111-11.xml
+++ b/glsa-201111-11.xml
@@ -6,8 +6,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">tar</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>313333</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0624">CVE-2010-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0624">CVE-2010-0624</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:10 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:10Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:56 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:56Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201111-12.xml b/glsa-201111-12.xml
index f06469b3..65aca03f 100644
--- a/glsa-201111-12.xml
+++ b/glsa-201111-12.xml
@@ -6,8 +6,8 @@
found in abcm2ps.
</synopsis>
<product type="ebuild">abcm2ps</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>322859</bug>
<access>remote</access>
<affected>
@@ -56,12 +56,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3441">CVE-2010-3441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4743">CVE-2010-4743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4744">CVE-2010-4744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3441">CVE-2010-3441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4743">CVE-2010-4743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4744">CVE-2010-4744</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:36:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:36:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:57:02 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:57:02Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-01.xml b/glsa-201201-01.xml
index fa354b5e..44c2fa6e 100644
--- a/glsa-201201-01.xml
+++ b/glsa-201201-01.xml
@@ -6,8 +6,8 @@
of which allows the execution of arbitrary PHP code.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>January 04, 2012</announced>
- <revised>January 04, 2012: 1</revised>
+ <announced>2012-01-04</announced>
+ <revised>2012-01-04: 1</revised>
<bug>302745</bug>
<bug>335490</bug>
<bug>336462</bug>
@@ -52,99 +52,99 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7251">CVE-2008-7251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7252">CVE-2008-7252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2958">CVE-2010-2958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3055">CVE-2010-3055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3056">CVE-2010-3056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3263">CVE-2010-3263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0986">CVE-2011-0986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0987">CVE-2011-0987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2505">CVE-2011-2505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2506">CVE-2011-2506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2507">CVE-2011-2507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2508">CVE-2011-2508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2642">CVE-2011-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2643">CVE-2011-2643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2718">CVE-2011-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2719">CVE-2011-2719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3646">CVE-2011-3646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4064">CVE-2011-4064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4107">CVE-2011-4107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4634">CVE-2011-4634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4780">CVE-2011-4780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4782">CVE-2011-4782</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7251">CVE-2008-7251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7252">CVE-2008-7252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2958">CVE-2010-2958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3055">CVE-2010-3055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3056">CVE-2010-3056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3263">CVE-2010-3263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0986">CVE-2011-0986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0987">CVE-2011-0987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2505">CVE-2011-2505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2506">CVE-2011-2506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2507">CVE-2011-2507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2508">CVE-2011-2508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2642">CVE-2011-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2643">CVE-2011-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2718">CVE-2011-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2719">CVE-2011-2719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3646">CVE-2011-3646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4064">CVE-2011-4064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4107">CVE-2011-4107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4634">CVE-2011-4634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4780">CVE-2011-4780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4782">CVE-2011-4782</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php">
PMASA-2010-1
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php">
PMASA-2010-2
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php">
PMASA-2010-4
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php">
PMASA-2010-5
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php">
PMASA-2010-6
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php">
PMASA-2010-7
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php">
PMASA-2011-1
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php">
PMASA-2011-10
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php">
PMASA-2011-11
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php">
PMASA-2011-12
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php">
PMASA-2011-15
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php">
PMASA-2011-16
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php">
PMASA-2011-17
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
PMASA-2011-18
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php">
PMASA-2011-19
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php">
PMASA-2011-2
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php">
PMASA-2011-20
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php">
PMASA-2011-5
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php">
PMASA-2011-6
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php">
PMASA-2011-7
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php">
PMASA-2011-8
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php">
PMASA-2011-9
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:11 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:11Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 04 Jan 2012 23:40:25 +0000" tag="submitter">
+ <metadata timestamp="2012-01-04T23:40:25Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201201-02.xml b/glsa-201201-02.xml
index 0e6bb3a2..25dd10b6 100644
--- a/glsa-201201-02.xml
+++ b/glsa-201201-02.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>January 05, 2012</announced>
- <revised>January 05, 2012: 1</revised>
+ <announced>2012-01-05</announced>
+ <revised>2012-01-05: 1</revised>
<bug>220813</bug>
<bug>229329</bug>
<bug>237166</bug>
@@ -62,40 +62,40 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3963">CVE-2008-3963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4097">CVE-2008-4097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4098">CVE-2008-4098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4456">CVE-2008-4456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7247">CVE-2008-7247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2446">CVE-2009-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4019">CVE-2009-4019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4028">CVE-2009-4028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4484">CVE-2009-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1621">CVE-2010-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1626">CVE-2010-1626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1848">CVE-2010-1848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1849">CVE-2010-1849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1850">CVE-2010-1850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2008">CVE-2010-2008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3676">CVE-2010-3676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3677">CVE-2010-3677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3678">CVE-2010-3678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3679">CVE-2010-3679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3680">CVE-2010-3680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3681">CVE-2010-3681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3682">CVE-2010-3682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3683">CVE-2010-3683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3833">CVE-2010-3833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3834">CVE-2010-3834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3835">CVE-2010-3835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3836">CVE-2010-3836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3837">CVE-2010-3837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3838">CVE-2010-3838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3839">CVE-2010-3839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3840">CVE-2010-3840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3963">CVE-2008-3963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4097">CVE-2008-4097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4098">CVE-2008-4098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4456">CVE-2008-4456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7247">CVE-2008-7247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2446">CVE-2009-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4019">CVE-2009-4019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4028">CVE-2009-4028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4484">CVE-2009-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1621">CVE-2010-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1626">CVE-2010-1626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1848">CVE-2010-1848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1849">CVE-2010-1849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1850">CVE-2010-1850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2008">CVE-2010-2008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3676">CVE-2010-3676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3677">CVE-2010-3677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3678">CVE-2010-3678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3679">CVE-2010-3679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3680">CVE-2010-3680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3681">CVE-2010-3681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3682">CVE-2010-3682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3683">CVE-2010-3683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3833">CVE-2010-3833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3834">CVE-2010-3834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3835">CVE-2010-3835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3836">CVE-2010-3836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3837">CVE-2010-3837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3838">CVE-2010-3838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3839">CVE-2010-3839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3840">CVE-2010-3840</uri>
</references>
- <metadata timestamp="Wed, 26 Oct 2011 21:42:54 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Thu, 05 Jan 2012 22:45:51 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T21:42:54Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2012-01-05T22:45:51Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/glsa-201201-03.xml b/glsa-201201-03.xml
index d2aa5c92..ae58dca1 100644
--- a/glsa-201201-03.xml
+++ b/glsa-201201-03.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>January 08, 2012</announced>
- <revised>January 08, 2012: 1</revised>
+ <announced>2012-01-08</announced>
+ <revised>2012-01-08: 1</revised>
<bug>394587</bug>
<bug>397907</bug>
<access>remote</access>
@@ -60,56 +60,56 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3903">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3903">
CVE-2011-3903
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3904">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3904">
CVE-2011-3904
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3906">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3906">
CVE-2011-3906
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3907">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3907">
CVE-2011-3907
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3908">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3908">
CVE-2011-3908
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3909">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3909">
CVE-2011-3909
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3910">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3910">
CVE-2011-3910
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3912">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3912">
CVE-2011-3912
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3913">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3913">
CVE-2011-3913
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3914">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3914">
CVE-2011-3914
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3917">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3917">
CVE-2011-3917
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3921">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3921">
CVE-2011-3921
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3922">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3922">
CVE-2011-3922
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html">
Release Notes 16.0.912.63
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html">
Release Notes 16.0.912.75
</uri>
</references>
- <metadata timestamp="Tue, 13 Dec 2011 18:43:14 +0000" tag="requester">
+ <metadata timestamp="2011-12-13T18:43:14Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 08 Jan 2012 04:30:40 +0000" tag="submitter">
+ <metadata timestamp="2012-01-08T04:30:40Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201201-04.xml b/glsa-201201-04.xml
index c293c9f5..3041cf9b 100644
--- a/glsa-201201-04.xml
+++ b/glsa-201201-04.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Logsurfer</product>
- <announced>January 20, 2012</announced>
- <revised>January 20, 2012: 1</revised>
+ <announced>2012-01-20</announced>
+ <revised>2012-01-20: 1</revised>
<bug>387397</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3626">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3626">
CVE-2011-3626
</uri>
</references>
- <metadata timestamp="Sat, 19 Nov 2011 12:42:58 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 20 Jan 2012 18:19:29 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-19T12:42:58Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-01-20T18:19:29Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-05.xml b/glsa-201201-05.xml
index 5b95c693..2adbd19a 100644
--- a/glsa-201201-05.xml
+++ b/glsa-201201-05.xml
@@ -6,8 +6,8 @@
could lead to execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mDNSResponder</product>
- <announced>January 22, 2012</announced>
- <revised>January 22, 2012: 1</revised>
+ <announced>2012-01-22</announced>
+ <revised>2012-01-22: 1</revised>
<bug>290822</bug>
<access>local, remote</access>
<affected>
@@ -48,15 +48,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386">CVE-2007-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744">CVE-2007-3744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828">CVE-2007-3828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989">CVE-2008-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326">CVE-2008-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630">CVE-2008-3630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386">CVE-2007-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744">CVE-2007-3744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828">CVE-2007-3828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989">CVE-2008-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326">CVE-2008-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630">CVE-2008-3630</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:04 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:04Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 22 Jan 2012 13:43:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-22T13:43:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-06.xml b/glsa-201201-06.xml
index 412bc4b1..dcc9b5d2 100644
--- a/glsa-201201-06.xml
+++ b/glsa-201201-06.xml
@@ -6,8 +6,8 @@
result in execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">iscsitarget</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>314187</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0743">CVE-2010-0743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0743">CVE-2010-0743</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:07 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:50:37 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:07Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T11:50:37Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-07.xml b/glsa-201201-07.xml
index 8e34d584..0c3427c2 100644
--- a/glsa-201201-07.xml
+++ b/glsa-201201-07.xml
@@ -6,8 +6,8 @@
could allow local attackers to gain root privileges.
</synopsis>
<product type="ebuild">NX Server NX Node</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>378345</bug>
<access>local</access>
<affected>
@@ -58,12 +58,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3977">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3977">
CVE-2011-3977
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:19 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:19Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:55:50 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T11:55:50Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-08.xml b/glsa-201201-08.xml
index 9dada34b..26240ac2 100644
--- a/glsa-201201-08.xml
+++ b/glsa-201201-08.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">FontForge</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>386293</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4259">CVE-2010-4259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4259">CVE-2010-4259</uri>
</references>
- <metadata timestamp="Wed, 12 Oct 2011 15:24:32 +0000" tag="requester">
+ <metadata timestamp="2011-10-12T15:24:32Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:57:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T11:57:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-09.xml b/glsa-201201-09.xml
index e176b920..0dca5411 100644
--- a/glsa-201201-09.xml
+++ b/glsa-201201-09.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>332701</bug>
<bug>342121</bug>
<bug>345843</bug>
@@ -49,72 +49,72 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 ">
CVE-2010-1797
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 ">
CVE-2010-2497
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 ">
CVE-2010-2498
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 ">
CVE-2010-2499
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 ">
CVE-2010-2500
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 ">
CVE-2010-2519
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 ">
CVE-2010-2520
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 ">
CVE-2010-2527
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 ">
CVE-2010-2541
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 ">
CVE-2010-2805
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 ">
CVE-2010-2806
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 ">
CVE-2010-2807
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 ">
CVE-2010-2808
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 ">
CVE-2010-3053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 ">
CVE-2010-3054
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 ">
CVE-2010-3311
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 ">
CVE-2010-3814
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 ">
CVE-2010-3855
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 ">
CVE-2011-0226
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 ">
CVE-2011-3256
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439 ">
CVE-2011-3439
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:52 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:52Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:48:21 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:48:21Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-10.xml b/glsa-201201-10.xml
index 76cd5bb6..d11401d0 100644
--- a/glsa-201201-10.xml
+++ b/glsa-201201-10.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">JasPer</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>394879</bug>
<access>remote</access>
<affected>
@@ -56,11 +56,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4516">CVE-2011-4516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4517">CVE-2011-4517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4516">CVE-2011-4516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4517">CVE-2011-4517</uri>
</references>
- <metadata timestamp="Tue, 27 Dec 2011 05:22:50 +0000" tag="requester">
+ <metadata timestamp="2011-12-27T05:22:50Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:50:54 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:50:54Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-11.xml b/glsa-201201-11.xml
index 2503ca9b..f47a40e3 100644
--- a/glsa-201201-11.xml
+++ b/glsa-201201-11.xml
@@ -6,8 +6,8 @@
attackers to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fwbuilder</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>235809</bug>
<bug>285861</bug>
<access>local</access>
@@ -49,9 +49,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4956">CVE-2008-4956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4664">CVE-2009-4664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4956">CVE-2008-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4664">CVE-2009-4664</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:46 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:53:36 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:46Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T19:53:36Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-12.xml b/glsa-201201-12.xml
index 0bd1787b..d34e4c28 100644
--- a/glsa-201201-12.xml
+++ b/glsa-201201-12.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>388769</bug>
<bug>394969</bug>
<access>remote</access>
@@ -57,12 +57,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768">CVE-2011-2768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769">CVE-2011-2769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778">CVE-2011-2778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768">CVE-2011-2768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769">CVE-2011-2769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778">CVE-2011-2778</uri>
</references>
- <metadata timestamp="Sun, 01 Jan 2012 17:49:33 +0000" tag="requester">
+ <metadata timestamp="2012-01-01T17:49:33Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:55:45 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:55:45Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-13.xml b/glsa-201201-13.xml
index bbafd290..443fe117 100644
--- a/glsa-201201-13.xml
+++ b/glsa-201201-13.xml
@@ -6,8 +6,8 @@
most severe of which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>303723</bug>
<bug>308021</bug>
<bug>321935</bug>
@@ -58,29 +58,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3295">CVE-2009-3295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4212">CVE-2009-4212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0283">CVE-2010-0283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0629">CVE-2010-0629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1320">CVE-2010-1320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1321">CVE-2010-1321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1322">CVE-2010-1322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1323">CVE-2010-1323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1324">CVE-2010-1324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4020">CVE-2010-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4021">CVE-2010-4021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4022">CVE-2010-4022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0281">CVE-2011-0281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0282">CVE-2011-0282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0283">CVE-2011-0283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0284">CVE-2011-0284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0285">CVE-2011-0285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1527">CVE-2011-1527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1528">CVE-2011-1528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1529">CVE-2011-1529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1530">CVE-2011-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4151">CVE-2011-4151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3295">CVE-2009-3295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4212">CVE-2009-4212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0283">CVE-2010-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0629">CVE-2010-0629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1320">CVE-2010-1320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1321">CVE-2010-1321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1322">CVE-2010-1322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1323">CVE-2010-1323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1324">CVE-2010-1324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4020">CVE-2010-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4021">CVE-2010-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4022">CVE-2010-4022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0281">CVE-2011-0281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0282">CVE-2011-0282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0283">CVE-2011-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0284">CVE-2011-0284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0285">CVE-2011-0285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1527">CVE-2011-1527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1528">CVE-2011-1528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1529">CVE-2011-1529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1530">CVE-2011-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4151">CVE-2011-4151</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:18 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 20:00:30 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:38:18Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T20:00:30Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201201-14.xml b/glsa-201201-14.xml
index 4edc2f84..980c41e7 100644
--- a/glsa-201201-14.xml
+++ b/glsa-201201-14.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">mit-krb5-appl</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>374229</bug>
<bug>396137</bug>
<access>remote</access>
@@ -62,9 +62,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1526">CVE-2011-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1526">CVE-2011-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
</references>
- <metadata timestamp="Sun, 08 Jan 2012 17:28:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 20:02:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-08T17:28:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-01-23T20:02:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-15.xml b/glsa-201201-15.xml
index 27f39adf..5c0bd1d4 100644
--- a/glsa-201201-15.xml
+++ b/glsa-201201-15.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">ktsuss</product>
- <announced>January 27, 2012</announced>
- <revised>January 27, 2012: 1</revised>
+ <announced>2012-01-27</announced>
+ <revised>2012-01-27: 1</revised>
<bug>381115</bug>
<access>local</access>
<affected>
@@ -49,11 +49,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2921">CVE-2011-2921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2922">CVE-2011-2922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2921">CVE-2011-2921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2922">CVE-2011-2922</uri>
</references>
- <metadata timestamp="Thu, 27 Oct 2011 21:00:00 +0000" tag="requester">
+ <metadata timestamp="2011-10-27T21:00:00Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 27 Jan 2012 14:41:59 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:41:59Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201201-16.xml b/glsa-201201-16.xml
index 79d77ddc..5ad983de 100644
--- a/glsa-201201-16.xml
+++ b/glsa-201201-16.xml
@@ -7,8 +7,8 @@
locking utilities.
</synopsis>
<product type="ebuild">xkeyboard-config xorg-server</product>
- <announced>January 27, 2012</announced>
- <revised>January 27, 2012: 1</revised>
+ <announced>2012-01-27</announced>
+ <revised>2012-01-27: 1</revised>
<bug>399347</bug>
<access>local</access>
<affected>
@@ -63,8 +63,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0064">CVE-2012-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0064">CVE-2012-0064</uri>
</references>
- <metadata timestamp="Thu, 19 Jan 2012 17:45:40 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Fri, 27 Jan 2012 20:35:28 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-19T17:45:40Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2012-01-27T20:35:28Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201201-17.xml b/glsa-201201-17.xml
index 84bfb109..a63bb3a2 100644
--- a/glsa-201201-17.xml
+++ b/glsa-201201-17.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>January 28, 2012</announced>
- <revised>January 28, 2012: 1</revised>
+ <announced>2012-01-28</announced>
+ <revised>2012-01-28: 1</revised>
<bug>400551</bug>
<access>remote</access>
<affected>
@@ -44,29 +44,29 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924">
CVE-2011-3924
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925">
CVE-2011-3925
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926">
CVE-2011-3926
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927">
CVE-2011-3927
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928">
CVE-2011-3928
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html">
Release Notes 16.0.912.77
</uri>
</references>
- <metadata timestamp="Tue, 24 Jan 2012 07:47:36 +0000" tag="requester">
+ <metadata timestamp="2012-01-24T07:47:36Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 28 Jan 2012 03:36:47 +0000" tag="submitter">
+ <metadata timestamp="2012-01-28T03:36:47Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201201-18.xml b/glsa-201201-18.xml
index adf353f6..79cb40dd 100644
--- a/glsa-201201-18.xml
+++ b/glsa-201201-18.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service or possibly execute arbitrary code.
</synopsis>
<product type="ebuild">bip</product>
- <announced>January 30, 2012</announced>
- <revised>January 30, 2012: 1</revised>
+ <announced>2012-01-30</announced>
+ <revised>2012-01-30: 1</revised>
<bug>336321</bug>
<bug>400599</bug>
<access>remote</access>
@@ -56,11 +56,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3071">CVE-2010-3071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0806">CVE-2012-0806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3071">CVE-2010-3071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0806">CVE-2012-0806</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:17 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:17Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 30 Jan 2012 12:28:13 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-30T12:28:13Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201201-19.xml b/glsa-201201-19.xml
index 81a863ca..ff66f9b6 100644
--- a/glsa-201201-19.xml
+++ b/glsa-201201-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or conduct various other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 30, 2012</announced>
- <revised>January 30, 2012: 1</revised>
+ <announced>2012-01-30</announced>
+ <revised>2012-01-30: 1</revised>
<bug>354211</bug>
<bug>382969</bug>
<bug>393481</bug>
@@ -45,64 +45,64 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4091">CVE-2010-4091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0562">CVE-2011-0562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0563">CVE-2011-0563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0565">CVE-2011-0565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0566">CVE-2011-0566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0567">CVE-2011-0567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0570">CVE-2011-0570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0585">CVE-2011-0585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0586">CVE-2011-0586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0587">CVE-2011-0587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0588">CVE-2011-0588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0590">CVE-2011-0590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0591">CVE-2011-0591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0592">CVE-2011-0592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0593">CVE-2011-0593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0594">CVE-2011-0594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0595">CVE-2011-0595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0596">CVE-2011-0596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0598">CVE-2011-0598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0599">CVE-2011-0599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0600">CVE-2011-0600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0602">CVE-2011-0602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0603">CVE-2011-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0604">CVE-2011-0604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0605">CVE-2011-0605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0606">CVE-2011-0606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2431">CVE-2011-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2432">CVE-2011-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2433">CVE-2011-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2434">CVE-2011-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2435">CVE-2011-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2436">CVE-2011-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2437">CVE-2011-2437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2438">CVE-2011-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2439">CVE-2011-2439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2440">CVE-2011-2440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2441">CVE-2011-2441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2442">CVE-2011-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2462">CVE-2011-2462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4369">CVE-2011-4369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4091">CVE-2010-4091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0562">CVE-2011-0562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0563">CVE-2011-0563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0565">CVE-2011-0565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0566">CVE-2011-0566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0567">CVE-2011-0567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0570">CVE-2011-0570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0585">CVE-2011-0585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0586">CVE-2011-0586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0587">CVE-2011-0587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0588">CVE-2011-0588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0590">CVE-2011-0590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0591">CVE-2011-0591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0592">CVE-2011-0592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0593">CVE-2011-0593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0594">CVE-2011-0594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0595">CVE-2011-0595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0596">CVE-2011-0596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0598">CVE-2011-0598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0599">CVE-2011-0599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0600">CVE-2011-0600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0602">CVE-2011-0602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0603">CVE-2011-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0604">CVE-2011-0604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0605">CVE-2011-0605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0606">CVE-2011-0606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2431">CVE-2011-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2432">CVE-2011-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2433">CVE-2011-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2434">CVE-2011-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2435">CVE-2011-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2436">CVE-2011-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2437">CVE-2011-2437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2438">CVE-2011-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2439">CVE-2011-2439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2440">CVE-2011-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2441">CVE-2011-2441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2442">CVE-2011-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2462">CVE-2011-2462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4369">CVE-2011-4369</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:13 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:13Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 30 Jan 2012 12:29:20 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-30T12:29:20Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201202-01.xml b/glsa-201202-01.xml
index 3452a00c..d56dddf0 100644
--- a/glsa-201202-01.xml
+++ b/glsa-201202-01.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>February 18, 2012</announced>
- <revised>February 18, 2012: 1</revised>
+ <announced>2012-02-18</announced>
+ <revised>2012-02-18: 1</revised>
<bug>402841</bug>
<bug>404067</bug>
<access>remote</access>
@@ -49,110 +49,110 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3016">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3016">
CVE-2011-3016
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3017">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3017">
CVE-2011-3017
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3018">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3018">
CVE-2011-3018
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3019">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3019">
CVE-2011-3019
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3020">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3020">
CVE-2011-3020
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3021">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3021">
CVE-2011-3021
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3022">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3022">
CVE-2011-3022
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3023">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3023">
CVE-2011-3023
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3024">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3024">
CVE-2011-3024
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3025">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3025">
CVE-2011-3025
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3027">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3027">
CVE-2011-3027
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3953">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3953">
CVE-2011-3953
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3954">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3954">
CVE-2011-3954
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3955">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3955">
CVE-2011-3955
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3956">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3956">
CVE-2011-3956
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3957">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3957">
CVE-2011-3957
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3958">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3958">
CVE-2011-3958
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3959">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3959">
CVE-2011-3959
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3960">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3960">
CVE-2011-3960
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3961">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3961">
CVE-2011-3961
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3962">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3962">
CVE-2011-3962
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3963">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3963">
CVE-2011-3963
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3964">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3964">
CVE-2011-3964
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3965">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3965">
CVE-2011-3965
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3966">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3966">
CVE-2011-3966
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3967">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3967">
CVE-2011-3967
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3968">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3968">
CVE-2011-3968
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3969">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3969">
CVE-2011-3969
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3970">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3970">
CVE-2011-3970
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3971">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3971">
CVE-2011-3971
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3972">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3972">
CVE-2011-3972
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html">
Release Notes 17.0.963.46
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html">
Release Notes 17.0.963.56
</uri>
</references>
- <metadata timestamp="Mon, 13 Feb 2012 09:29:19 +0000" tag="requester">
+ <metadata timestamp="2012-02-13T09:29:19Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 18 Feb 2012 17:34:34 +0000" tag="submitter">
+ <metadata timestamp="2012-02-18T17:34:34Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201202-02.xml b/glsa-201202-02.xml
index fb2031a7..5b1111f5 100644
--- a/glsa-201202-02.xml
+++ b/glsa-201202-02.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Quagga</product>
- <announced>February 21, 2012</announced>
- <revised>February 21, 2012: 2</revised>
+ <announced>2012-02-21</announced>
+ <revised>2012-02-21: 2</revised>
<bug>334303</bug>
<bug>359903</bug>
<bug>384651</bug>
@@ -55,18 +55,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1674">CVE-2010-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1675">CVE-2010-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2948">CVE-2010-2948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2949">CVE-2010-2949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3323">CVE-2011-3323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3324">CVE-2011-3324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3325">CVE-2011-3325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3326">CVE-2011-3326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3327">CVE-2011-3327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1674">CVE-2010-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1675">CVE-2010-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2948">CVE-2010-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2949">CVE-2010-2949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3323">CVE-2011-3323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3324">CVE-2011-3324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3325">CVE-2011-3325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3326">CVE-2011-3326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3327">CVE-2011-3327</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:14 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:14Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 21 Feb 2012 19:14:56 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-02-21T19:14:56Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/glsa-201202-03.xml b/glsa-201202-03.xml
index 21d10084..c8781abc 100644
--- a/glsa-201202-03.xml
+++ b/glsa-201202-03.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">maradns</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>397431</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0024">CVE-2012-0024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0024">CVE-2012-0024</uri>
</references>
- <metadata timestamp="Mon, 20 Feb 2012 21:36:13 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:45:52 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-02-20T21:36:13Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:45:52Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201202-04.xml b/glsa-201202-04.xml
index 2efcbfce..ec90803c 100644
--- a/glsa-201202-04.xml
+++ b/glsa-201202-04.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">pdns</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>398403</bug>
<access>remote</access>
<affected>
@@ -54,11 +54,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0206">CVE-2012-0206</uri>
- <uri link="http://doc.powerdns.com/powerdns-advisory-2012-01.html">PowerDNS
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0206">CVE-2012-0206</uri>
+ <uri link="https://doc.powerdns.com/powerdns-advisory-2012-01.html">PowerDNS
Security Advisory 2012-01
</uri>
</references>
- <metadata timestamp="Fri, 27 Jan 2012 14:47:52 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:50:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:47:52Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:50:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201202-05.xml b/glsa-201202-05.xml
index 122ea63a..6f9f9a9c 100644
--- a/glsa-201202-05.xml
+++ b/glsa-201202-05.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>396105</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
</references>
- <metadata timestamp="Tue, 17 Jan 2012 19:55:41 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:56:26 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-17T19:55:41Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-02-22T19:56:26Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201202-06.xml b/glsa-201202-06.xml
index ec0f9bc9..3f3c8dd3 100644
--- a/glsa-201202-06.xml
+++ b/glsa-201202-06.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>399507</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0885">CVE-2012-0885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0885">CVE-2012-0885</uri>
</references>
- <metadata timestamp="Fri, 27 Jan 2012 14:53:19 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:58:56 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:53:19Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:58:56Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201202-07.xml b/glsa-201202-07.xml
index 0a2f2d98..90699082 100644
--- a/glsa-201202-07.xml
+++ b/glsa-201202-07.xml
@@ -6,8 +6,8 @@
might allow guest OS users to read arbitrary files on the host OS.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>February 27, 2012</announced>
- <revised>February 27, 2012: 1</revised>
+ <announced>2012-02-27</announced>
+ <revised>2012-02-27: 1</revised>
<bug>358877</bug>
<bug>372963</bug>
<bug>373991</bug>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1146">CVE-2011-1146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1486">CVE-2011-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2178">CVE-2011-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2511">CVE-2011-2511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1146">CVE-2011-1146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1486">CVE-2011-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2178">CVE-2011-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2511">CVE-2011-2511</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:16 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 27 Feb 2012 22:20:05 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:16Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-02-27T22:20:05Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201202-08.xml b/glsa-201202-08.xml
index 35757c9e..6623ec1d 100644
--- a/glsa-201202-08.xml
+++ b/glsa-201202-08.xml
@@ -6,8 +6,8 @@
cause a Denial of Service and potentially arbitrary code execution.
</synopsis>
<product type="ebuild">ebuild stunnel</product>
- <announced>February 29, 2012</announced>
- <revised>July 30, 2012: 2</revised>
+ <announced>2012-02-29</announced>
+ <revised>2012-07-30: 2</revised>
<bug>379859</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2940">CVE-2011-2940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2940">CVE-2011-2940</uri>
</references>
- <metadata timestamp="Sun, 30 Oct 2011 18:44:45 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Mon, 30 Jul 2012 23:07:18 +0000" tag="submitter">ago</metadata>
+ <metadata timestamp="2011-10-30T18:44:45Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-07-30T23:07:18Z" tag="submitter">ago</metadata>
</glsa>
diff --git a/glsa-201202-09.xml b/glsa-201202-09.xml
index 856531bc..470996ff 100644
--- a/glsa-201202-09.xml
+++ b/glsa-201202-09.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>February 29, 2012</announced>
- <revised>February 29, 2012: 2</revised>
+ <announced>2012-02-29</announced>
+ <revised>2012-02-29: 2</revised>
<bug>398361</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919">CVE-2011-3919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919">CVE-2011-3919</uri>
</references>
- <metadata timestamp="Mon, 16 Jan 2012 09:34:21 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Wed, 29 Feb 2012 20:10:19 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-16T09:34:21Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-02-29T20:10:19Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-01.xml b/glsa-201203-01.xml
index fe6b6633..165e5b8b 100644
--- a/glsa-201203-01.xml
+++ b/glsa-201203-01.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">spamdyke</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>399157</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0802">CVE-2012-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0802">CVE-2012-0802</uri>
</references>
- <metadata timestamp="Tue, 17 Jan 2012 23:00:49 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:01:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-17T23:00:49Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-03-06T01:01:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-02.xml b/glsa-201203-02.xml
index ffd4fdb6..b7f7b480 100644
--- a/glsa-201203-02.xml
+++ b/glsa-201203-02.xml
@@ -6,8 +6,8 @@
which might allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>308645</bug>
<bug>373235</bug>
<bug>400799</bug>
@@ -64,17 +64,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734">CVE-2010-0734
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734">CVE-2010-0734
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192">CVE-2011-2192
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192">CVE-2011-2192
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036">CVE-2012-0036
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036">CVE-2012-0036
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:07Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:02:18 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:02:18Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-03.xml b/glsa-201203-03.xml
index 65e1fab0..c9c65316 100644
--- a/glsa-201203-03.xml
+++ b/glsa-201203-03.xml
@@ -6,8 +6,8 @@
which might allow local attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">puppet</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>303729</bug>
<bug>308031</bug>
<bug>384859</bug>
@@ -49,17 +49,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3564">CVE-2009-3564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0156">CVE-2010-0156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3848">CVE-2011-3848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3869">CVE-2011-3869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3870">CVE-2011-3870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3871">CVE-2011-3871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3872">CVE-2011-3872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1053">CVE-2012-1053
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3564">CVE-2009-3564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0156">CVE-2010-0156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3848">CVE-2011-3848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3869">CVE-2011-3869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3870">CVE-2011-3870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3871">CVE-2011-3871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3872">CVE-2011-3872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1053">CVE-2012-1053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1054">CVE-2012-1054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1054">CVE-2012-1054</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:03:42 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-03-06T01:03:42Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-04.xml b/glsa-201203-04.xml
index b7be26ff..3a57a4ee 100644
--- a/glsa-201203-04.xml
+++ b/glsa-201203-04.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>405261</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0841">CVE-2012-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0841">CVE-2012-0841</uri>
</references>
- <metadata timestamp="Sun, 04 Mar 2012 20:55:53 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:04:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-04T20:55:53Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:04:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-05.xml b/glsa-201203-05.xml
index 892b4b72..1b31b1ef 100644
--- a/glsa-201203-05.xml
+++ b/glsa-201203-05.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">rack</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>396455</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5036">CVE-2011-5036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5036">CVE-2011-5036</uri>
</references>
- <metadata timestamp="Sun, 04 Mar 2012 21:22:25 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:05:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-04T21:22:25Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:05:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-06.xml b/glsa-201203-06.xml
index 43fda601..9d265929 100644
--- a/glsa-201203-06.xml
+++ b/glsa-201203-06.xml
@@ -6,8 +6,8 @@
attackers to possibly gain escalated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>351490</bug>
<bug>401533</bug>
<access>local</access>
@@ -53,11 +53,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0010">CVE-2011-0010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0809">CVE-2012-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0010">CVE-2011-0010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0809">CVE-2012-0809</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:40 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:40Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:39:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:39:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-07.xml b/glsa-201203-07.xml
index 4a6964b8..7848a162 100644
--- a/glsa-201203-07.xml
+++ b/glsa-201203-07.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">foomatic-filters</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>379559</bug>
<access>remote</access>
<affected>
@@ -46,9 +46,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2697">CVE-2011-2697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2964">CVE-2011-2964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2697">CVE-2011-2697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2964">CVE-2011-2964</uri>
</references>
- <metadata timestamp="Sun, 29 Jan 2012 22:40:52 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:40:15 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-29T22:40:52Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:40:15Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-08.xml b/glsa-201203-08.xml
index 7704d7b7..79fabf95 100644
--- a/glsa-201203-08.xml
+++ b/glsa-201203-08.xml
@@ -4,8 +4,8 @@
<title>libxslt: Denial of Service</title>
<synopsis>A vulnerability in libxslt could result in Denial of Service.</synopsis>
<product type="ebuild">libxslt</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>402861</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3970">CVE-2011-3970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3970">CVE-2011-3970</uri>
</references>
- <metadata timestamp="Sat, 03 Mar 2012 04:30:56 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:41:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-03T04:30:56Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:41:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-09.xml b/glsa-201203-09.xml
index f8215de1..f8a89cf9 100644
--- a/glsa-201203-09.xml
+++ b/glsa-201203-09.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>402999</bug>
<access>remote</access>
<affected>
@@ -52,9 +52,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0247">CVE-2012-0247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0248">CVE-2012-0248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0247">CVE-2012-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0248">CVE-2012-0248</uri>
</references>
- <metadata timestamp="Sat, 03 Mar 2012 14:41:18 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:41:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-03T14:41:18Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:41:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-10.xml b/glsa-201203-10.xml
index ee601ed7..2bcaaaa3 100644
--- a/glsa-201203-10.xml
+++ b/glsa-201203-10.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libmikmod</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>335892</bug>
<access>remote</access>
<affected>
@@ -56,9 +56,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2546">CVE-2010-2546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2971">CVE-2010-2971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2546">CVE-2010-2546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2971">CVE-2010-2971</uri>
</references>
- <metadata timestamp="Fri, 02 Mar 2012 20:38:21 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:42:39 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-02T20:38:21Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:42:39Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-11.xml b/glsa-201203-11.xml
index 7aa72875..9b4b7aeb 100644
--- a/glsa-201203-11.xml
+++ b/glsa-201203-11.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">usbmuxd</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>399409</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0065">CVE-2012-0065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0065">CVE-2012-0065</uri>
</references>
- <metadata timestamp="Mon, 23 Jan 2012 14:30:43 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:43:19 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T14:30:43Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-03-06T01:43:19Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-12.xml b/glsa-201203-12.xml
index 831a623b..2f7a2310 100644
--- a/glsa-201203-12.xml
+++ b/glsa-201203-12.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 06, 2012</announced>
- <revised>June 06, 2015: 9</revised>
+ <announced>2012-03-06</announced>
+ <revised>2015-06-06: 9</revised>
<bug>397695</bug>
<bug>399365</bug>
<access>remote</access>
@@ -93,16 +93,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108">CVE-2011-4108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109">CVE-2011-4109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576">CVE-2011-4576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577">CVE-2011-4577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619">CVE-2011-4619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027">CVE-2012-0027</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108">CVE-2011-4108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109">CVE-2011-4109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576">CVE-2011-4576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577">CVE-2011-4577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619">CVE-2011-4619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027">CVE-2012-0027</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050 ">
CVE-2012-0050
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2012 19:58:37 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:08:28 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-16T19:58:37Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:08:28Z">ackle</metadata>
</glsa>
diff --git a/glsa-201203-13.xml b/glsa-201203-13.xml
index 4296f860..aeb62aa6 100644
--- a/glsa-201203-13.xml
+++ b/glsa-201203-13.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">Openswan</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>372961</bug>
<bug>389097</bug>
<access>local, remote</access>
@@ -54,9 +54,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2147">CVE-2011-2147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4073">CVE-2011-4073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2147">CVE-2011-2147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4073">CVE-2011-4073</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:14:35 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:56:03 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:14:35Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:56:03Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-14.xml b/glsa-201203-14.xml
index fe8f9746..a30d1410 100644
--- a/glsa-201203-14.xml
+++ b/glsa-201203-14.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">audacious-plugins</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>383991</bug>
<access>remote</access>
<affected>
@@ -62,12 +62,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
</references>
- <metadata timestamp="Sun, 11 Mar 2012 14:43:54 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:57:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-11T14:43:54Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:57:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-15.xml b/glsa-201203-15.xml
index b1c6b4bc..e5528e1c 100644
--- a/glsa-201203-15.xml
+++ b/glsa-201203-15.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gif2png</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>351698</bug>
<access>remote</access>
<affected>
@@ -51,9 +51,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4694">CVE-2010-4694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4695">CVE-2010-4695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4694">CVE-2010-4694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4695">CVE-2010-4695</uri>
</references>
- <metadata timestamp="Fri, 09 Mar 2012 22:46:15 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:58:44 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-09T22:46:15Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:58:44Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-16.xml b/glsa-201203-16.xml
index 03927b20..2a1dd0f2 100644
--- a/glsa-201203-16.xml
+++ b/glsa-201203-16.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libmodplug</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 2</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 2</revised>
<bug>362503</bug>
<bug>379557</bug>
<access>remote</access>
@@ -70,15 +70,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1574">CVE-2011-1574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1574">CVE-2011-1574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:18 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:18Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:02:28 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:02:28Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-17.xml b/glsa-201203-17.xml
index e02b8e4f..8de15d62 100644
--- a/glsa-201203-17.xml
+++ b/glsa-201203-17.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">hplip</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>352085</bug>
<bug>388655</bug>
<access>local, remote</access>
@@ -54,11 +54,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4267">CVE-2010-4267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2722">CVE-2011-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4267">CVE-2010-4267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2722">CVE-2011-2722</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:15 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:15Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:04:44 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:04:44Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-18.xml b/glsa-201203-18.xml
index e64a53e1..df8ff28b 100644
--- a/glsa-201203-18.xml
+++ b/glsa-201203-18.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Minitube</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>388867</bug>
<access>local</access>
<affected>
@@ -50,6 +50,6 @@
Release
</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:07:35 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:06:53 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:07:35Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:06:53Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-19.xml b/glsa-201203-19.xml
index bf17f6b3..01b11840 100644
--- a/glsa-201203-19.xml
+++ b/glsa-201203-19.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>March 25, 2012</announced>
- <revised>March 25, 2012: 1</revised>
+ <announced>2012-03-25</announced>
+ <revised>2012-03-25: 1</revised>
<bug>406975</bug>
<bug>407465</bug>
<bug>407755</bug>
@@ -51,98 +51,98 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3031">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3031">
CVE-2011-3031
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3032">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3032">
CVE-2011-3032
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3033">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3033">
CVE-2011-3033
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3034">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3034">
CVE-2011-3034
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3035">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3035">
CVE-2011-3035
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3036">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3036">
CVE-2011-3036
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3037">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3037">
CVE-2011-3037
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3038">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3038">
CVE-2011-3038
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3039">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3039">
CVE-2011-3039
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3040">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3040">
CVE-2011-3040
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3041">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3041">
CVE-2011-3041
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3042">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3042">
CVE-2011-3042
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3043">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3043">
CVE-2011-3043
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3044">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3044">
CVE-2011-3044
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3046">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3046">
CVE-2011-3046
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3047">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3047">
CVE-2011-3047
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3049">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3049">
CVE-2011-3049
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3050">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3050">
CVE-2011-3050
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3051">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3051">
CVE-2011-3051
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3052">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3052">
CVE-2011-3052
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3053">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3053">
CVE-2011-3053
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3054">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3054">
CVE-2011-3054
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3055">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3055">
CVE-2011-3055
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3056">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3056">
CVE-2011-3056
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
CVE-2011-3057
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html">
Release Notes 17.0.963.65
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-channel-update.html">
Release Notes 17.0.963.78
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update_10.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-update_10.html">
Release Notes 17.0.963.79
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html">
Release Notes 17.0.963.83
</uri>
</references>
- <metadata timestamp="Mon, 05 Mar 2012 19:46:58 +0000" tag="requester">
+ <metadata timestamp="2012-03-05T19:46:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 25 Mar 2012 16:05:36 +0000" tag="submitter">
+ <metadata timestamp="2012-03-25T16:05:36Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201203-20.xml b/glsa-201203-20.xml
index 12daa03f..e9662188 100644
--- a/glsa-201203-20.xml
+++ b/glsa-201203-20.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Logwatch</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>356387</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1018">CVE-2011-1018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1018">CVE-2011-1018</uri>
</references>
- <metadata timestamp="Fri, 16 Mar 2012 19:51:03 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:30:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T19:51:03Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-28T10:30:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-21.xml b/glsa-201203-21.xml
index b7997d15..b7d8a3f0 100644
--- a/glsa-201203-21.xml
+++ b/glsa-201203-21.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>408431</bug>
<access>remote</access>
<affected>
@@ -49,15 +49,15 @@
</resolution>
<references>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2012-002.txt">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2012-002.txt">
AST-2012-002
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2012-003.txt">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2012-003.txt">
AST-2012-003
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1183">CVE-2012-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1184">CVE-2012-1184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1183">CVE-2012-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1184">CVE-2012-1184</uri>
</references>
- <metadata timestamp="Fri, 16 Mar 2012 10:54:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:35:00 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:54:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-28T10:35:00Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-22.xml b/glsa-201203-22.xml
index f05ab05b..cd962340 100644
--- a/glsa-201203-22.xml
+++ b/glsa-201203-22.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>293785</bug>
<bug>293786</bug>
<bug>293788</bug>
@@ -66,17 +66,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896">CVE-2009-3896
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896">CVE-2009-3896
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898">CVE-2009-3898
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898">CVE-2009-3898
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315">CVE-2011-4315
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315">CVE-2011-4315
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180">CVE-2012-1180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180">CVE-2012-1180
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:49 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:35:47 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:49Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-03-28T10:35:47Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-23.xml b/glsa-201203-23.xml
index 7a72191b..417eb3dc 100644
--- a/glsa-201203-23.xml
+++ b/glsa-201203-23.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libzip</product>
- <announced>March 29, 2012</announced>
- <revised>March 29, 2012: 1</revised>
+ <announced>2012-03-29</announced>
+ <revised>2012-03-29: 1</revised>
<bug>409117</bug>
<access>remote</access>
<affected>
@@ -53,9 +53,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1162">CVE-2012-1162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1163">CVE-2012-1163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1162">CVE-2012-1162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1163">CVE-2012-1163</uri>
</references>
- <metadata timestamp="Fri, 23 Mar 2012 11:20:26 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 29 Mar 2012 11:18:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-23T11:20:26Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-29T11:18:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201203-24.xml b/glsa-201203-24.xml
index c5ac7a1f..5f21af54 100644
--- a/glsa-201203-24.xml
+++ b/glsa-201203-24.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>March 30, 2012</announced>
- <revised>March 30, 2012: 1</revised>
+ <announced>2012-03-30</announced>
+ <revised>2012-03-30: 1</revised>
<bug>410045</bug>
<access>remote</access>
<affected>
@@ -63,41 +63,41 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
CVE-2011-3057
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3058">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3058">
CVE-2011-3058
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3059">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3059">
CVE-2011-3059
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3060">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3060">
CVE-2011-3060
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3061">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3061">
CVE-2011-3061
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3062">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3062">
CVE-2011-3062
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3063">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3063">
CVE-2011-3063
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3064">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3064">
CVE-2011-3064
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3065">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3065">
CVE-2011-3065
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html">
Release Notes 18.0.1025.142
</uri>
</references>
- <metadata timestamp="Fri, 30 Mar 2012 07:32:06 +0000" tag="requester">
+ <metadata timestamp="2012-03-30T07:32:06Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Fri, 30 Mar 2012 22:22:41 +0000" tag="submitter">
+ <metadata timestamp="2012-03-30T22:22:41Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201204-01.xml b/glsa-201204-01.xml
index a9a159e1..31a5bb2f 100644
--- a/glsa-201204-01.xml
+++ b/glsa-201204-01.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>April 09, 2012</announced>
- <revised>April 09, 2012: 1</revised>
+ <announced>2012-04-09</announced>
+ <revised>2012-04-09: 1</revised>
<bug>386317</bug>
<bug>399807</bug>
<access>local</access>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4414">CVE-2010-4414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2300">CVE-2011-2300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2305">CVE-2011-2305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0105">CVE-2012-0105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0111">CVE-2012-0111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4414">CVE-2010-4414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2300">CVE-2011-2300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2305">CVE-2011-2305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0105">CVE-2012-0105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0111">CVE-2012-0111</uri>
</references>
- <metadata timestamp="Wed, 07 Dec 2011 22:00:54 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Apr 2012 22:33:28 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-12-07T22:00:54Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-09T22:33:28Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-02.xml b/glsa-201204-02.xml
index 5845a2a0..20fb9cfe 100644
--- a/glsa-201204-02.xml
+++ b/glsa-201204-02.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">InspIRCd</product>
- <announced>April 10, 2012</announced>
- <revised>April 10, 2012: 1</revised>
+ <announced>2012-04-10</announced>
+ <revised>2012-04-10: 1</revised>
<bug>409159</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1836">CVE-2012-1836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1836">CVE-2012-1836</uri>
</references>
- <metadata timestamp="Fri, 23 Mar 2012 11:55:36 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 10 Apr 2012 11:06:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-23T11:55:36Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-10T11:06:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-03.xml b/glsa-201204-03.xml
index b8f93b69..2a675462 100644
--- a/glsa-201204-03.xml
+++ b/glsa-201204-03.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>April 10, 2012</announced>
- <revised>April 10, 2012: 1</revised>
+ <announced>2012-04-10</announced>
+ <revised>2012-04-10: 1</revised>
<bug>410963</bug>
<access>remote</access>
<affected>
@@ -45,50 +45,50 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066">
CVE-2011-3066
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067">
CVE-2011-3067
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068">
CVE-2011-3068
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069">
CVE-2011-3069
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070">
CVE-2011-3070
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071">
CVE-2011-3071
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072">
CVE-2011-3072
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073">
CVE-2011-3073
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074">
CVE-2011-3074
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075">
CVE-2011-3075
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076">
CVE-2011-3076
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077">
CVE-2011-3077
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html">
Release Notes 18.0.1025.151
</uri>
</references>
- <metadata timestamp="Tue, 10 Apr 2012 08:53:22 +0000" tag="requester">
+ <metadata timestamp="2012-04-10T08:53:22Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 10 Apr 2012 21:54:33 +0000" tag="submitter">
+ <metadata timestamp="2012-04-10T21:54:33Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201204-04.xml b/glsa-201204-04.xml
index 880a27c8..3ac9395b 100644
--- a/glsa-201204-04.xml
+++ b/glsa-201204-04.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>407257</bug>
<access>remote</access>
<affected>
@@ -44,26 +44,26 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1126">CVE-2012-1126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1127">CVE-2012-1127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1128">CVE-2012-1128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1129">CVE-2012-1129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1130">CVE-2012-1130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1131">CVE-2012-1131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1132">CVE-2012-1132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1133">CVE-2012-1133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1134">CVE-2012-1134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1135">CVE-2012-1135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1136">CVE-2012-1136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1137">CVE-2012-1137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1138">CVE-2012-1138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1139">CVE-2012-1139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1140">CVE-2012-1140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1141">CVE-2012-1141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1142">CVE-2012-1142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1143">CVE-2012-1143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1144">CVE-2012-1144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1126">CVE-2012-1126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1127">CVE-2012-1127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1128">CVE-2012-1128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1129">CVE-2012-1129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1130">CVE-2012-1130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1131">CVE-2012-1131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1132">CVE-2012-1132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1133">CVE-2012-1133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1134">CVE-2012-1134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1135">CVE-2012-1135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1136">CVE-2012-1136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1137">CVE-2012-1137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1138">CVE-2012-1138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1139">CVE-2012-1139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1140">CVE-2012-1140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1141">CVE-2012-1141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1142">CVE-2012-1142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1143">CVE-2012-1143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1144">CVE-2012-1144</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 18:44:31 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:43:12 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T18:44:31Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:43:12Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-05.xml b/glsa-201204-05.xml
index a49cb992..d5e96caf 100644
--- a/glsa-201204-05.xml
+++ b/glsa-201204-05.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">SWFTools</product>
- <announced>April 17, 2012</announced>
- <revised>April 18, 2012: 2</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-18: 2</revised>
<bug>332649</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1516">CVE-2010-1516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1516">CVE-2010-1516</uri>
</references>
- <metadata timestamp="Fri, 06 Apr 2012 20:23:27 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 18 Apr 2012 22:59:36 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-06T20:23:27Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-18T22:59:36Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-06.xml b/glsa-201204-06.xml
index 5e0f58eb..aeb9888a 100644
--- a/glsa-201204-06.xml
+++ b/glsa-201204-06.xml
@@ -6,8 +6,8 @@
which may allow a local attacker to gain root privileges.
</synopsis>
<product type="ebuild">polkit</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>314535</bug>
<bug>364973</bug>
<bug>401513</bug>
@@ -57,12 +57,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0750">CVE-2010-0750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1485">CVE-2011-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4945">CVE-2011-4945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0750">CVE-2010-0750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1485">CVE-2011-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4945">CVE-2011-4945</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:57 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:57Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:43:48 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:43:48Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-07.xml b/glsa-201204-07.xml
index d02c805f..564d3684 100644
--- a/glsa-201204-07.xml
+++ b/glsa-201204-07.xml
@@ -6,8 +6,8 @@
might allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>390149</bug>
<bug>404101</bug>
<bug>407023</bug>
@@ -51,28 +51,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445">CVE-2011-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450">CVE-2011-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451">CVE-2011-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452">CVE-2011-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453">CVE-2011-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454">CVE-2011-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455">CVE-2011-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456">CVE-2011-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457">CVE-2011-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458">CVE-2011-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459">CVE-2011-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460">CVE-2011-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752">CVE-2012-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753">CVE-2012-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754">CVE-2012-0754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755">CVE-2012-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756">CVE-2012-0756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767">CVE-2012-0767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768">CVE-2012-0768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769">CVE-2012-0769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773">CVE-2012-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445">CVE-2011-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450">CVE-2011-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451">CVE-2011-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452">CVE-2011-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453">CVE-2011-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454">CVE-2011-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455">CVE-2011-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456">CVE-2011-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457">CVE-2011-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458">CVE-2011-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459">CVE-2011-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460">CVE-2011-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752">CVE-2012-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753">CVE-2012-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754">CVE-2012-0754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755">CVE-2012-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756">CVE-2012-0756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767">CVE-2012-0767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768">CVE-2012-0768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769">CVE-2012-0769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773">CVE-2012-0773</uri>
</references>
- <metadata timestamp="Fri, 02 Dec 2011 19:37:21 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:44:16 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-12-02T19:37:21Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-04-17T22:44:16Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201204-08.xml b/glsa-201204-08.xml
index 5f669548..74b7d859 100644
--- a/glsa-201204-08.xml
+++ b/glsa-201204-08.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">DBD-Pg</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>407549</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1151">CVE-2012-1151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1151">CVE-2012-1151</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 19:18:38 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:44:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T19:18:38Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:44:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201205-01.xml b/glsa-201205-01.xml
index 1fcb87f9..b96db195 100644
--- a/glsa-201205-01.xml
+++ b/glsa-201205-01.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>May 15, 2012</announced>
- <revised>May 15, 2012: 1</revised>
+ <announced>2012-05-15</announced>
+ <revised>2012-05-15: 1</revised>
<bug>414199</bug>
<access>remote</access>
<affected>
@@ -44,17 +44,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3078">CVE-2011-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3081">CVE-2011-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1521">CVE-2012-1521</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3078">CVE-2011-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3081">CVE-2011-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1521">CVE-2012-1521</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html">
Release Notes 18.0.1025.168
</uri>
</references>
- <metadata timestamp="Wed, 02 May 2012 15:49:58 +0000" tag="requester">
+ <metadata timestamp="2012-05-02T15:49:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 15 May 2012 06:57:17 +0000" tag="submitter">
+ <metadata timestamp="2012-05-15T06:57:17Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201205-02.xml b/glsa-201205-02.xml
index 005ec14a..5ea051af 100644
--- a/glsa-201205-02.xml
+++ b/glsa-201205-02.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">ConnMan</product>
- <announced>May 15, 2012</announced>
- <revised>May 15, 2012: 1</revised>
+ <announced>2012-05-15</announced>
+ <revised>2012-05-15: 1</revised>
<bug>415415</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2320">CVE-2012-2320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2321">CVE-2012-2321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2322">CVE-2012-2322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2320">CVE-2012-2320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2321">CVE-2012-2321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2322">CVE-2012-2322</uri>
</references>
- <metadata timestamp="Fri, 11 May 2012 12:11:41 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 15 May 2012 21:51:20 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-11T12:11:41Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-05-15T21:51:20Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201205-03.xml b/glsa-201205-03.xml
index f9b96dd3..661c4311 100644
--- a/glsa-201205-03.xml
+++ b/glsa-201205-03.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>May 21, 2012</announced>
- <revised>May 21, 2012: 1</revised>
+ <announced>2012-05-21</announced>
+ <revised>2012-05-21: 1</revised>
<bug>416119</bug>
<access>remote</access>
<affected>
@@ -58,62 +58,62 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3083">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3083">
CVE-2011-3083
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3084">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3084">
CVE-2011-3084
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3085">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3085">
CVE-2011-3085
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3086">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3086">
CVE-2011-3086
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3087">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3087">
CVE-2011-3087
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3088">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3088">
CVE-2011-3088
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3089">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3089">
CVE-2011-3089
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3090">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3090">
CVE-2011-3090
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3091">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3091">
CVE-2011-3091
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3092">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3092">
CVE-2011-3092
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3093">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3093">
CVE-2011-3093
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3094">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3094">
CVE-2011-3094
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3095">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3095">
CVE-2011-3095
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3096">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3096">
CVE-2011-3096
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3100">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3100">
CVE-2011-3100
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3101">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3101">
CVE-2011-3101
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html">
Release Notes 19.0.1084.46
</uri>
</references>
- <metadata timestamp="Wed, 16 May 2012 06:58:58 +0000" tag="requester">
+ <metadata timestamp="2012-05-16T06:58:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Mon, 21 May 2012 06:46:40 +0000" tag="submitter">
+ <metadata timestamp="2012-05-21T06:46:40Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201205-04.xml b/glsa-201205-04.xml
index 1169967f..efd5b37e 100644
--- a/glsa-201205-04.xml
+++ b/glsa-201205-04.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>May 27, 2012</announced>
- <revised>May 27, 2012: 1</revised>
+ <announced>2012-05-27</announced>
+ <revised>2012-05-27: 1</revised>
<bug>417321</bug>
<access>remote</access>
<affected>
@@ -59,41 +59,41 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3103">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3103">
CVE-2011-3103
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3104">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3104">
CVE-2011-3104
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3105">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3105">
CVE-2011-3105
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3106">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3106">
CVE-2011-3106
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3107">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3107">
CVE-2011-3107
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3108">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3108">
CVE-2011-3108
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3109">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3109">
CVE-2011-3109
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3111">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3111">
CVE-2011-3111
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3115">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3115">
CVE-2011-3115
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html">
Release Notes 19.0.1084.52
</uri>
</references>
- <metadata timestamp="Sat, 26 May 2012 16:55:13 +0000" tag="requester">
+ <metadata timestamp="2012-05-26T16:55:13Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 27 May 2012 22:45:29 +0000" tag="submitter">
+ <metadata timestamp="2012-05-27T22:45:29Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201206-01.xml b/glsa-201206-01.xml
index a99347ed..117b8e88 100644
--- a/glsa-201206-01.xml
+++ b/glsa-201206-01.xml
@@ -6,8 +6,8 @@
which allowing to cause remote Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>June 02, 2012</announced>
- <revised>June 02, 2012: 1</revised>
+ <announced>2012-06-02</announced>
+ <revised>2012-06-02: 1</revised>
<bug>347621</bug>
<bug>356223</bug>
<bug>368863</bug>
@@ -54,16 +54,16 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3613">CVE-2010-3613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3614">CVE-2010-3614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3615">CVE-2010-3615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3762">CVE-2010-3762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0414">CVE-2011-0414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1910">CVE-2011-1910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2464">CVE-2011-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2465">CVE-2011-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4313">CVE-2011-4313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3613">CVE-2010-3613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3614">CVE-2010-3614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3615">CVE-2010-3615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3762">CVE-2010-3762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0414">CVE-2011-0414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1910">CVE-2011-1910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2464">CVE-2011-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2465">CVE-2011-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4313">CVE-2011-4313</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 02 Jun 2012 13:53:49 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-02T13:53:49Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-02.xml b/glsa-201206-02.xml
index d3d160cb..be3aa2f9 100644
--- a/glsa-201206-02.xml
+++ b/glsa-201206-02.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">qt-gui</product>
- <announced>June 03, 2012</announced>
- <revised>June 03, 2012: 1</revised>
+ <announced>2012-06-03</announced>
+ <revised>2012-06-03: 1</revised>
<bug>384089</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3194">CVE-2011-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3194">CVE-2011-3194</uri>
</references>
- <metadata timestamp="Tue, 15 May 2012 06:37:52 +0000" tag="requester">
+ <metadata timestamp="2012-05-15T06:37:52Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 03 Jun 2012 11:37:52 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-03T11:37:52Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-03.xml b/glsa-201206-03.xml
index a4bdd775..64d3fca2 100644
--- a/glsa-201206-03.xml
+++ b/glsa-201206-03.xml
@@ -6,8 +6,8 @@
which allow for the execution of arbitrary code.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>June 15, 2012</announced>
- <revised>June 15, 2012: 1</revised>
+ <announced>2012-06-15</announced>
+ <revised>2012-06-15: 1</revised>
<bug>264831</bug>
<bug>283391</bug>
<bug>290862</bug>
@@ -76,111 +76,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234">CVE-2009-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059">CVE-2009-2059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063">CVE-2009-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067">CVE-2009-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070">CVE-2009-2070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013">CVE-2009-3013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044">CVE-2009-3044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045">CVE-2009-3045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046">CVE-2009-3046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047">CVE-2009-3047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048">CVE-2009-3048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049">CVE-2009-3049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831">CVE-2009-3831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071">CVE-2009-4071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072">CVE-2009-4072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653">CVE-2010-0653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349">CVE-2010-1349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989">CVE-2010-1989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993">CVE-2010-1993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121">CVE-2010-2121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421">CVE-2010-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455">CVE-2010-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576">CVE-2010-2576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658">CVE-2010-2658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659">CVE-2010-2659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660">CVE-2010-2660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661">CVE-2010-2661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662">CVE-2010-2662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663">CVE-2010-2663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664">CVE-2010-2664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665">CVE-2010-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019">CVE-2010-3019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020">CVE-2010-3020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021">CVE-2010-3021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579">CVE-2010-4579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580">CVE-2010-4580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581">CVE-2010-4581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582">CVE-2010-4582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583">CVE-2010-4583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584">CVE-2010-4584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585">CVE-2010-4585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586">CVE-2010-4586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681">CVE-2011-0681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682">CVE-2011-0682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683">CVE-2011-0683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684">CVE-2011-0684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685">CVE-2011-0685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686">CVE-2011-0686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687">CVE-2011-0687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337">CVE-2011-1337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824">CVE-2011-1824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609">CVE-2011-2609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610">CVE-2011-2610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611">CVE-2011-2611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612">CVE-2011-2612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613">CVE-2011-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614">CVE-2011-2614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615">CVE-2011-2615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616">CVE-2011-2616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617">CVE-2011-2617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618">CVE-2011-2618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619">CVE-2011-2619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620">CVE-2011-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621">CVE-2011-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622">CVE-2011-2622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623">CVE-2011-2623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624">CVE-2011-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625">CVE-2011-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626">CVE-2011-2626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627">CVE-2011-2627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628">CVE-2011-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629">CVE-2011-2629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630">CVE-2011-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631">CVE-2011-2631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632">CVE-2011-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633">CVE-2011-2633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634">CVE-2011-2634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635">CVE-2011-2635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636">CVE-2011-2636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637">CVE-2011-2637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638">CVE-2011-2638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639">CVE-2011-2639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640">CVE-2011-2640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641">CVE-2011-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388">CVE-2011-3388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065">CVE-2011-4065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681">CVE-2011-4681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682">CVE-2011-4682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683">CVE-2011-4683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924">CVE-2012-1924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925">CVE-2012-1925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926">CVE-2012-1926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927">CVE-2012-1927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928">CVE-2012-1928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930">CVE-2012-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931">CVE-2012-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555">CVE-2012-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556">CVE-2012-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557">CVE-2012-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558">CVE-2012-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560">CVE-2012-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561">CVE-2012-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234">CVE-2009-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059">CVE-2009-2059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063">CVE-2009-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067">CVE-2009-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070">CVE-2009-2070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013">CVE-2009-3013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044">CVE-2009-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045">CVE-2009-3045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046">CVE-2009-3046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047">CVE-2009-3047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048">CVE-2009-3048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049">CVE-2009-3049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831">CVE-2009-3831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071">CVE-2009-4071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072">CVE-2009-4072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653">CVE-2010-0653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349">CVE-2010-1349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989">CVE-2010-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993">CVE-2010-1993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121">CVE-2010-2121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421">CVE-2010-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455">CVE-2010-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576">CVE-2010-2576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658">CVE-2010-2658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659">CVE-2010-2659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660">CVE-2010-2660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661">CVE-2010-2661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662">CVE-2010-2662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663">CVE-2010-2663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664">CVE-2010-2664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665">CVE-2010-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019">CVE-2010-3019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020">CVE-2010-3020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021">CVE-2010-3021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579">CVE-2010-4579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580">CVE-2010-4580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581">CVE-2010-4581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582">CVE-2010-4582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583">CVE-2010-4583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584">CVE-2010-4584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585">CVE-2010-4585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586">CVE-2010-4586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681">CVE-2011-0681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682">CVE-2011-0682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683">CVE-2011-0683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684">CVE-2011-0684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685">CVE-2011-0685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686">CVE-2011-0686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687">CVE-2011-0687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337">CVE-2011-1337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824">CVE-2011-1824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609">CVE-2011-2609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610">CVE-2011-2610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611">CVE-2011-2611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612">CVE-2011-2612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613">CVE-2011-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614">CVE-2011-2614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615">CVE-2011-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616">CVE-2011-2616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617">CVE-2011-2617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618">CVE-2011-2618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619">CVE-2011-2619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620">CVE-2011-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621">CVE-2011-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622">CVE-2011-2622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623">CVE-2011-2623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624">CVE-2011-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625">CVE-2011-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626">CVE-2011-2626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627">CVE-2011-2627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628">CVE-2011-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629">CVE-2011-2629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630">CVE-2011-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631">CVE-2011-2631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632">CVE-2011-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633">CVE-2011-2633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634">CVE-2011-2634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635">CVE-2011-2635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636">CVE-2011-2636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637">CVE-2011-2637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638">CVE-2011-2638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639">CVE-2011-2639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640">CVE-2011-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641">CVE-2011-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388">CVE-2011-3388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065">CVE-2011-4065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681">CVE-2011-4681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682">CVE-2011-4682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683">CVE-2011-4683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924">CVE-2012-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925">CVE-2012-1925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926">CVE-2012-1926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927">CVE-2012-1927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928">CVE-2012-1928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930">CVE-2012-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931">CVE-2012-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555">CVE-2012-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556">CVE-2012-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557">CVE-2012-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558">CVE-2012-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560">CVE-2012-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561">CVE-2012-3561</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:35 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:35Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Fri, 15 Jun 2012 17:22:37 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-15T17:22:37Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-04.xml b/glsa-201206-04.xml
index 16c76aa1..7efbb6b6 100644
--- a/glsa-201206-04.xml
+++ b/glsa-201206-04.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">argyllcms</product>
- <announced>June 18, 2012</announced>
- <revised>June 18, 2012: 1</revised>
+ <announced>2012-06-18</announced>
+ <revised>2012-06-18: 1</revised>
<bug>416781</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1616">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1616">
CVE-2012-1616
</uri>
</references>
- <metadata timestamp="Tue, 22 May 2012 19:47:51 +0000" tag="requester">n0idx80</metadata>
- <metadata timestamp="Mon, 18 Jun 2012 22:09:51 +0000" tag="submitter">n0idx80</metadata>
+ <metadata timestamp="2012-05-22T19:47:51Z" tag="requester">n0idx80</metadata>
+ <metadata timestamp="2012-06-18T22:09:51Z" tag="submitter">n0idx80</metadata>
</glsa>
diff --git a/glsa-201206-05.xml b/glsa-201206-05.xml
index 9929beab..6651f217 100644
--- a/glsa-201206-05.xml
+++ b/glsa-201206-05.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>413353</bug>
<bug>418189</bug>
<bug>418191</bug>
@@ -57,12 +57,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414">CVE-2012-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415">CVE-2012-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416">CVE-2012-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947">CVE-2012-2947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948">CVE-2012-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414">CVE-2012-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415">CVE-2012-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416">CVE-2012-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947">CVE-2012-2947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948">CVE-2012-2948</uri>
</references>
- <metadata timestamp="Tue, 24 Apr 2012 21:44:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 00:28:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-24T21:44:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-21T00:28:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-06.xml b/glsa-201206-06.xml
index 416dec08..2194d113 100644
--- a/glsa-201206-06.xml
+++ b/glsa-201206-06.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">OpenJPEG</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>409203</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1499">CVE-2012-1499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1499">CVE-2012-1499</uri>
</references>
- <metadata timestamp="Thu, 22 Mar 2012 13:07:16 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 00:29:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-22T13:07:16Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-21T00:29:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-07.xml b/glsa-201206-07.xml
index 36b34e8b..3a28abd5 100644
--- a/glsa-201206-07.xml
+++ b/glsa-201206-07.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>411751</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2089">CVE-2012-2089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2089">CVE-2012-2089</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 17:34:10 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 10:10:12 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-15T17:34:10Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-06-21T10:10:12Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-08.xml b/glsa-201206-08.xml
index 2bd65907..de4f07e3 100644
--- a/glsa-201206-08.xml
+++ b/glsa-201206-08.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code as root.
</synopsis>
<product type="ebuild">wicd</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>401005</bug>
<bug>411729</bug>
<access>local</access>
@@ -50,11 +50,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0813">CVE-2012-0813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2095">CVE-2012-2095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0813">CVE-2012-0813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2095">CVE-2012-2095</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 04:06:17 +0000" tag="requester">
+ <metadata timestamp="2012-04-15T04:06:17Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 10:10:59 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-21T10:10:59Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-09.xml b/glsa-201206-09.xml
index eb3f2e5f..e9282f10 100644
--- a/glsa-201206-09.xml
+++ b/glsa-201206-09.xml
@@ -6,8 +6,8 @@
which leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">MediaWiki</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>366685</bug>
<bug>409513</bug>
<access>remote</access>
@@ -47,22 +47,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787">CVE-2010-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788">CVE-2010-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789">CVE-2010-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003">CVE-2011-0003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047">CVE-2011-0047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537">CVE-2011-0537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579">CVE-2011-1579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580">CVE-2011-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1578">CVE-2012-1578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1579">CVE-2012-1579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1580">CVE-2012-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1581">CVE-2012-1581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1582">CVE-2012-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787">CVE-2010-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788">CVE-2010-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789">CVE-2010-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003">CVE-2011-0003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047">CVE-2011-0047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537">CVE-2011-0537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579">CVE-2011-1579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580">CVE-2011-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1578">CVE-2012-1578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1579">CVE-2012-1579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1580">CVE-2012-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1581">CVE-2012-1581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1582">CVE-2012-1582</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 12:42:24 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:10:28 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-08T12:42:24Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-21T18:10:28Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-10.xml b/glsa-201206-10.xml
index 44c50cc6..04b71a8f 100644
--- a/glsa-201206-10.xml
+++ b/glsa-201206-10.xml
@@ -6,8 +6,8 @@
which allowing for remote Denial of Service.
</synopsis>
<product type="ebuild">ejabberd</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>308047</bug>
<bug>370201</bug>
<bug>386075</bug>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0305">CVE-2010-0305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1753">CVE-2011-1753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4320">CVE-2011-4320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0305">CVE-2010-0305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1753">CVE-2011-1753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4320">CVE-2011-4320</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:14:54 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-21T18:14:54Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-11.xml b/glsa-201206-11.xml
index 60566be2..4c932ece 100644
--- a/glsa-201206-11.xml
+++ b/glsa-201206-11.xml
@@ -6,8 +6,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Pidgin</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>299751</bug>
<bug>372785</bug>
<bug>385073</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0013">CVE-2010-0013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3594">CVE-2011-3594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0013">CVE-2010-0013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3594">CVE-2011-3594</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:06 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:06Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:17:26 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-21T18:17:26Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-12.xml b/glsa-201206-12.xml
index 9fa6cf43..d34e5e7d 100644
--- a/glsa-201206-12.xml
+++ b/glsa-201206-12.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2199">CVE-2011-2199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2199">CVE-2011-2199</uri>
</references>
<metadata tag="requester" timestamp="2011-10-07T23:37:00Z">underling</metadata>
<metadata tag="submitter" timestamp="2017-04-17T18:08:16Z">craig</metadata>
diff --git a/glsa-201206-13.xml b/glsa-201206-13.xml
index f620e1e6..5c9a40fd 100644
--- a/glsa-201206-13.xml
+++ b/glsa-201206-13.xml
@@ -6,8 +6,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mono mono-debugger</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>277878</bug>
<bug>342133</bug>
<bug>345561</bug>
@@ -69,19 +69,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3332">CVE-2010-3332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3369">CVE-2010-3369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4159">CVE-2010-4159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4225">CVE-2010-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4254">CVE-2010-4254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0989">CVE-2011-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0990">CVE-2011-0990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0991">CVE-2011-0991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0992">CVE-2011-0992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3332">CVE-2010-3332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3369">CVE-2010-3369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4159">CVE-2010-4159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4225">CVE-2010-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4254">CVE-2010-4254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0989">CVE-2011-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0990">CVE-2011-0990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0991">CVE-2011-0991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0992">CVE-2011-0992</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:43:20 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 20:40:21 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:43:20Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-21T20:40:21Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201206-14.xml b/glsa-201206-14.xml
index 910f31d0..6af7f1b8 100644
--- a/glsa-201206-14.xml
+++ b/glsa-201206-14.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or conduct various other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>405949</bug>
<bug>411499</bug>
<access>remote</access>
@@ -44,15 +44,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4370">CVE-2011-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4371">CVE-2011-4371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4372">CVE-2011-4372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4373">CVE-2011-4373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0774">CVE-2012-0774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0775">CVE-2012-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0776">CVE-2012-0776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0777">CVE-2012-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4370">CVE-2011-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4371">CVE-2011-4371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4372">CVE-2011-4372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4373">CVE-2011-4373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0774">CVE-2012-0774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0775">CVE-2012-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0776">CVE-2012-0776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0777">CVE-2012-0777</uri>
</references>
- <metadata timestamp="Thu, 12 Apr 2012 01:22:21 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 10:12:35 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-12T01:22:21Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T10:12:35Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-15.xml b/glsa-201206-15.xml
index b8c3827a..28bd63e0 100644
--- a/glsa-201206-15.xml
+++ b/glsa-201206-15.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>June 22, 2012</announced>
- <revised>January 03, 2017: 5</revised>
+ <announced>2012-06-22</announced>
+ <revised>2017-01-03: 5</revised>
<bug>373967</bug>
<bug>386185</bug>
<bug>401987</bug>
@@ -90,18 +90,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5063">CVE-2009-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2501">CVE-2011-2501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2690">CVE-2011-2690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2691">CVE-2011-2691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2692">CVE-2011-2692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3045">CVE-2011-3045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3048">CVE-2011-3048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3464">CVE-2011-3464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5063">CVE-2009-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2501">CVE-2011-2501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2690">CVE-2011-2690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2691">CVE-2011-2691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2692">CVE-2011-2692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3045">CVE-2011-3045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3048">CVE-2011-3048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3464">CVE-2011-3464</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:07 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:07Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:38:41 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:38:41Z">ackle</metadata>
</glsa>
diff --git a/glsa-201206-16.xml b/glsa-201206-16.xml
index ed773e22..9931093f 100644
--- a/glsa-201206-16.xml
+++ b/glsa-201206-16.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">TagLib</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>407673</bug>
<bug>410953</bug>
<access>remote</access>
@@ -58,10 +58,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1107">CVE-2012-1107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1108">CVE-2012-1108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1584">CVE-2012-1584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1107">CVE-2012-1107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1108">CVE-2012-1108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1584">CVE-2012-1584</uri>
</references>
- <metadata timestamp="Fri, 06 Apr 2012 15:50:48 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 16:29:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-06T15:50:48Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T16:29:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-17.xml b/glsa-201206-17.xml
index 6bed28d7..81bd8d9f 100644
--- a/glsa-201206-17.xml
+++ b/glsa-201206-17.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">virtualenv</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>395285</bug>
<access>local</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4617">CVE-2011-4617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4617">CVE-2011-4617</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:31:00 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 16:31:54 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:31:00Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T16:31:54Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-18.xml b/glsa-201206-18.xml
index 716cd2db..e70b8faf 100644
--- a/glsa-201206-18.xml
+++ b/glsa-201206-18.xml
@@ -6,8 +6,8 @@
remote attacker to perform man-in-the-middle or Denial of Service attacks.
</synopsis>
<product type="ebuild">GnuTLS</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>281224</bug>
<bug>292025</bug>
<bug>389947</bug>
@@ -61,11 +61,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4128">CVE-2011-4128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1573">CVE-2012-1573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4128">CVE-2011-4128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1573">CVE-2012-1573</uri>
</references>
- <metadata timestamp="Tue, 17 Apr 2012 00:40:28 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 14:21:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T00:40:28Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T14:21:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-19.xml b/glsa-201206-19.xml
index a937e883..30c01976 100644
--- a/glsa-201206-19.xml
+++ b/glsa-201206-19.xml
@@ -6,8 +6,8 @@
gain escalated privileges.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>411617</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0946">CVE-2012-0946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0946">CVE-2012-0946</uri>
</references>
- <metadata timestamp="Wed, 18 Apr 2012 00:15:12 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 14:21:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-18T00:15:12Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T14:21:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-20.xml b/glsa-201206-20.xml
index bc946857..57271d87 100644
--- a/glsa-201206-20.xml
+++ b/glsa-201206-20.xml
@@ -6,8 +6,8 @@
Service condition.
</synopsis>
<product type="ebuild">gdk-pixbuf</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>373999</bug>
<bug>412033</bug>
<access>remote</access>
@@ -54,11 +54,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2370">CVE-2012-2370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2370">CVE-2012-2370</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:08 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:08Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 20:11:46 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-23T20:11:46Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-21.xml b/glsa-201206-21.xml
index ad3d24b7..3b012d8e 100644
--- a/glsa-201206-21.xml
+++ b/glsa-201206-21.xml
@@ -6,8 +6,8 @@
could result in the execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>414603</bug>
<bug>420311</bug>
<access>remote</access>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0779">CVE-2012-0779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2034">CVE-2012-2034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2035">CVE-2012-2035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2036">CVE-2012-2036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2037">CVE-2012-2037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2038">CVE-2012-2038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2039">CVE-2012-2039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2040">CVE-2012-2040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0779">CVE-2012-0779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2034">CVE-2012-2034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2035">CVE-2012-2035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2036">CVE-2012-2036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2037">CVE-2012-2037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2038">CVE-2012-2038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2039">CVE-2012-2039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2040">CVE-2012-2040</uri>
</references>
- <metadata timestamp="Sat, 05 May 2012 11:36:09 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 20:11:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-05T11:36:09Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T20:11:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-22.xml b/glsa-201206-22.xml
index 8f57043f..676e1105 100644
--- a/glsa-201206-22.xml
+++ b/glsa-201206-22.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>290633</bug>
<bug>310105</bug>
<bug>323785</bug>
@@ -55,22 +55,22 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906">CVE-2009-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948">CVE-2009-2948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728">CVE-2010-0728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635">CVE-2010-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642">CVE-2010-1642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063">CVE-2010-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069">CVE-2010-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719">CVE-2011-0719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678">CVE-2011-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724">CVE-2011-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870">CVE-2012-0870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182">CVE-2012-1182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111">CVE-2012-2111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906">CVE-2009-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948">CVE-2009-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728">CVE-2010-0728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635">CVE-2010-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642">CVE-2010-1642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063">CVE-2010-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069">CVE-2010-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719">CVE-2011-0719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678">CVE-2011-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724">CVE-2011-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870">CVE-2012-0870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182">CVE-2012-1182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111">CVE-2012-2111</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:36:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:36:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 12:38:35 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T12:38:35Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-23.xml b/glsa-201206-23.xml
index 486814d7..a4ebb4f4 100644
--- a/glsa-201206-23.xml
+++ b/glsa-201206-23.xml
@@ -4,8 +4,8 @@
<title>PyCrypto: Weak key generation</title>
<synopsis>PyCrypto generates weak ElGamal keys.</synopsis>
<product type="ebuild">pycrypto</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>417625</bug>
<access>remote</access>
<affected>
@@ -37,8 +37,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2417">CVE-2012-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2417">CVE-2012-2417</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 22:45:07 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 12:38:41 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T22:45:07Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-24T12:38:41Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-24.xml b/glsa-201206-24.xml
index 8147f053..3bc2a060 100644
--- a/glsa-201206-24.xml
+++ b/glsa-201206-24.xml
@@ -6,8 +6,8 @@
which allowing to read, modify and overwrite arbitrary files.
</synopsis>
<product type="ebuild">apache tomcat</product>
- <announced>June 24, 2012</announced>
- <revised>March 20, 2016: 3</revised>
+ <announced>2012-06-24</announced>
+ <revised>2016-03-20: 3</revised>
<bug>272566</bug>
<bug>273662</bug>
<bug>303719</bug>
@@ -70,41 +70,41 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515">CVE-2008-5515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033">CVE-2009-0033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580">CVE-2009-0580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781">CVE-2009-0781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783">CVE-2009-0783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693">CVE-2009-2693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901">CVE-2009-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902">CVE-2009-2902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157">CVE-2010-1157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227">CVE-2010-2227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718">CVE-2010-3718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172">CVE-2010-4172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312">CVE-2010-4312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013">CVE-2011-0013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534">CVE-2011-0534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088">CVE-2011-1088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183">CVE-2011-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184">CVE-2011-1184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419">CVE-2011-1419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475">CVE-2011-1475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582">CVE-2011-1582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204">CVE-2011-2204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481">CVE-2011-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526">CVE-2011-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729">CVE-2011-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190">CVE-2011-3190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375">CVE-2011-3375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858">CVE-2011-4858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062">CVE-2011-5062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063">CVE-2011-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064">CVE-2011-5064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022">CVE-2012-0022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515">CVE-2008-5515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033">CVE-2009-0033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580">CVE-2009-0580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781">CVE-2009-0781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783">CVE-2009-0783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693">CVE-2009-2693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901">CVE-2009-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902">CVE-2009-2902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157">CVE-2010-1157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227">CVE-2010-2227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718">CVE-2010-3718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172">CVE-2010-4172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312">CVE-2010-4312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013">CVE-2011-0013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534">CVE-2011-0534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088">CVE-2011-1088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183">CVE-2011-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184">CVE-2011-1184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419">CVE-2011-1419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475">CVE-2011-1475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582">CVE-2011-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204">CVE-2011-2204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481">CVE-2011-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526">CVE-2011-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729">CVE-2011-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190">CVE-2011-3190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375">CVE-2011-3375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858">CVE-2011-4858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062">CVE-2011-5062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063">CVE-2011-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064">CVE-2011-5064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022">CVE-2012-0022</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:00 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 14:15:43 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:00Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-03-20T14:15:43Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201206-25.xml b/glsa-201206-25.xml
index 68c569e7..4562803a 100644
--- a/glsa-201206-25.xml
+++ b/glsa-201206-25.xml
@@ -4,8 +4,8 @@
<title>Apache HTTP Server: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities were found in Apache HTTP Server.</synopsis>
<product type="ebuild">apache</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>308049</bug>
<bug>330195</bug>
<bug>380475</bug>
@@ -55,22 +55,22 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408">CVE-2010-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434">CVE-2010-0434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452">CVE-2010-1452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791">CVE-2010-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192">CVE-2011-3192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348">CVE-2011-3348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368">CVE-2011-3368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607">CVE-2011-3607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317">CVE-2011-4317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021">CVE-2012-0021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031">CVE-2012-0031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053">CVE-2012-0053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883">CVE-2012-0883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408">CVE-2010-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434">CVE-2010-0434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452">CVE-2010-1452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791">CVE-2010-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192">CVE-2011-3192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348">CVE-2011-3348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368">CVE-2011-3368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607">CVE-2011-3607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317">CVE-2011-4317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021">CVE-2012-0021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031">CVE-2012-0031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053">CVE-2012-0053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883">CVE-2012-0883</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:41 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 14:28:33 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:41Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-24T14:28:33Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201206-26.xml b/glsa-201206-26.xml
index bf57bee8..244dfc79 100644
--- a/glsa-201206-26.xml
+++ b/glsa-201206-26.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">RPM</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>335880</bug>
<bug>384967</bug>
<bug>410949</bug>
@@ -72,17 +72,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2059">CVE-2010-2059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2197">CVE-2010-2197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2198">CVE-2010-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2199">CVE-2010-2199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3378">CVE-2011-3378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0060">CVE-2012-0060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0061">CVE-2012-0061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0815">CVE-2012-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2059">CVE-2010-2059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2197">CVE-2010-2197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2198">CVE-2010-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2199">CVE-2010-2199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3378">CVE-2011-3378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0060">CVE-2012-0060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0061">CVE-2012-0061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0815">CVE-2012-0815</uri>
</references>
- <metadata timestamp="Sun, 25 Mar 2012 14:53:26 +0000" tag="requester">
+ <metadata timestamp="2012-03-25T14:53:26Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 22:36:58 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T22:36:58Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-27.xml b/glsa-201206-27.xml
index ede13c65..2ad1e1d5 100644
--- a/glsa-201206-27.xml
+++ b/glsa-201206-27.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">mini_httpd</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>303755</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4490">CVE-2009-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4490">CVE-2009-4490</uri>
</references>
- <metadata timestamp="Fri, 11 May 2012 17:25:55 +0000" tag="requester">
+ <metadata timestamp="2012-05-11T17:25:55Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 22:37:57 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T22:37:57Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201206-28.xml b/glsa-201206-28.xml
index 20a5331e..08c0a463 100644
--- a/glsa-201206-28.xml
+++ b/glsa-201206-28.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">TeX Live</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>264598</bug>
<bug>324019</bug>
<access>remote</access>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1284">CVE-2009-1284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0739">CVE-2010-0739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0827">CVE-2010-0827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1440">CVE-2010-1440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1284">CVE-2009-1284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0739">CVE-2010-0739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0827">CVE-2010-0827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1440">CVE-2010-1440</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:50:51 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:50:51Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-29.xml b/glsa-201206-29.xml
index 7c4685d5..6a497fbf 100644
--- a/glsa-201206-29.xml
+++ b/glsa-201206-29.xml
@@ -6,8 +6,8 @@
which leading to privilege escalation.
</synopsis>
<product type="ebuild">mount-cifs</product>
- <announced>June 25, 2012</announced>
- <revised>February 02, 2014: 2</revised>
+ <announced>2012-06-25</announced>
+ <revised>2014-02-02: 2</revised>
<bug>308067</bug>
<access>remote</access>
<affected>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0547">CVE-2010-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0787">CVE-2010-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0547">CVE-2010-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0787">CVE-2010-0787</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:36:28 +0000">
+ <metadata tag="requester" timestamp="2011-10-08T22:36:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 18:36:37 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T18:36:37Z">craig</metadata>
</glsa>
diff --git a/glsa-201206-30.xml b/glsa-201206-30.xml
index d29b201a..f0fb5e64 100644
--- a/glsa-201206-30.xml
+++ b/glsa-201206-30.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>299120</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4565">CVE-2009-4565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4565">CVE-2009-4565</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:22 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:22Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:12 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:12Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-31.xml b/glsa-201206-31.xml
index 73c233ea..8b17a3d7 100644
--- a/glsa-201206-31.xml
+++ b/glsa-201206-31.xml
@@ -7,8 +7,8 @@
Service, corrupt data, or obtain sensitive information.
</synopsis>
<product type="ebuild">pam</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>343399</bug>
<bug>386273</bug>
<bug>388431</bug>
@@ -55,19 +55,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3316">CVE-2010-3316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3430">CVE-2010-3430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3431">CVE-2010-3431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3435">CVE-2010-3435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3853">CVE-2010-3853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4706">CVE-2010-4706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4707">CVE-2010-4707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4708">CVE-2010-4708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3148">CVE-2011-3148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3149">CVE-2011-3149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3316">CVE-2010-3316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3430">CVE-2010-3430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3431">CVE-2010-3431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3435">CVE-2010-3435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3853">CVE-2010-3853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4706">CVE-2010-4706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4707">CVE-2010-4707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4708">CVE-2010-4708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3148">CVE-2011-3148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3149">CVE-2011-3149</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:25 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:25Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-32.xml b/glsa-201206-32.xml
index f7eeba47..d3d91d8e 100644
--- a/glsa-201206-32.xml
+++ b/glsa-201206-32.xml
@@ -6,8 +6,8 @@
enable remote attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">Links</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>253847</bug>
<bug>411493</bug>
<access>remote</access>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://secunia.com/Advisories/33391/">Secunia Advisory SA33391</uri>
+ <uri link="https://secunia.com/Advisories/33391/">Secunia Advisory SA33391</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:18 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:32 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:18Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:32Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-33.xml b/glsa-201206-33.xml
index 796bf126..d6e4f7de 100644
--- a/glsa-201206-33.xml
+++ b/glsa-201206-33.xml
@@ -6,8 +6,8 @@
possibly allowing remote code execution.
</synopsis>
<product type="ebuild">Postfix</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>358085</bug>
<bug>366605</bug>
<access>remote</access>
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0411">CVE-2011-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720">CVE-2011-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0411">CVE-2011-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720">CVE-2011-1720</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:42 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:42Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-34.xml b/glsa-201206-34.xml
index f589ab06..56695373 100644
--- a/glsa-201206-34.xml
+++ b/glsa-201206-34.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">msmtp</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>293647</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3942">CVE-2009-3942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3942">CVE-2009-3942</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:28 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:50 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:28Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:50Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-35.xml b/glsa-201206-35.xml
index 2636b1f1..96823704 100644
--- a/glsa-201206-35.xml
+++ b/glsa-201206-35.xml
@@ -6,8 +6,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nbd</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>353097</bug>
<bug>372891</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530">CVE-2011-0530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1925">CVE-2011-1925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530">CVE-2011-0530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1925">CVE-2011-1925</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:56 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:56Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 19:17:58 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T19:17:58Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201206-36.xml b/glsa-201206-36.xml
index 068602a8..07d978e7 100644
--- a/glsa-201206-36.xml
+++ b/glsa-201206-36.xml
@@ -6,8 +6,8 @@
to arbitrary system command execution.
</synopsis>
<product type="ebuild">logrotate</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>356811</bug>
<bug>372973</bug>
<access>local</access>
@@ -48,13 +48,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1098">CVE-2011-1098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1154">CVE-2011-1154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1155">CVE-2011-1155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1549">CVE-2011-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1098">CVE-2011-1098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1154">CVE-2011-1154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1155">CVE-2011-1155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1549">CVE-2011-1549</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:29 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:29Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 19:17:59 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T19:17:59Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201207-01.xml b/glsa-201207-01.xml
index 32726221..77826694 100644
--- a/glsa-201207-01.xml
+++ b/glsa-201207-01.xml
@@ -6,8 +6,8 @@
to gain escalated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416281</bug>
<access>local</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2337">CVE-2012-2337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2337">CVE-2012-2337</uri>
</references>
- <metadata timestamp="Sat, 26 May 2012 19:07:01 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:09:16 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-26T19:07:01Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:09:16Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-02.xml b/glsa-201207-02.xml
index 1b35ff7d..281432dd 100644
--- a/glsa-201207-02.xml
+++ b/glsa-201207-02.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416209</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3102">CVE-2011-3102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3102">CVE-2011-3102</uri>
</references>
- <metadata timestamp="Tue, 29 May 2012 22:42:30 +0000" tag="requester">
+ <metadata timestamp="2012-05-29T22:42:30Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:09:24 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:09:24Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-03.xml b/glsa-201207-03.xml
index 1815989b..0eb206ac 100644
--- a/glsa-201207-03.xml
+++ b/glsa-201207-03.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">ChaSen</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>390769</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4000">CVE-2011-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4000">CVE-2011-4000</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 23:16:56 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:20:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-15T23:16:56Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:20:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-04.xml b/glsa-201207-04.xml
index 173e30d3..178b2174 100644
--- a/glsa-201207-04.xml
+++ b/glsa-201207-04.xml
@@ -6,8 +6,8 @@
privilege escalation or Denial of Service.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>412609</bug>
<access>local</access>
<affected>
@@ -58,8 +58,8 @@
<p>X.Org X Server 1.9.x is not affected.</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118">CVE-2012-2118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118">CVE-2012-2118</uri>
</references>
- <metadata timestamp="Sat, 02 Jun 2012 13:03:57 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:21:08 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-02T13:03:57Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:21:08Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-05.xml b/glsa-201207-05.xml
index 1dbf1dce..0f10c86a 100644
--- a/glsa-201207-05.xml
+++ b/glsa-201207-05.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pidgin-otr</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416263</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2369">CVE-2012-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2369">CVE-2012-2369</uri>
</references>
- <metadata timestamp="Sun, 10 Jun 2012 15:39:18 +0000" tag="requester">
+ <metadata timestamp="2012-06-10T15:39:18Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:35:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:35:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-06.xml b/glsa-201207-06.xml
index 247de623..f1994171 100644
--- a/glsa-201207-06.xml
+++ b/glsa-201207-06.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">jruby</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>396305</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4838">CVE-2011-4838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4838">CVE-2011-4838</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 19:25:16 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:35:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T19:25:16Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:35:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-07.xml b/glsa-201207-07.xml
index 8ffe82ac..0b118020 100644
--- a/glsa-201207-07.xml
+++ b/glsa-201207-07.xml
@@ -6,8 +6,8 @@
to kill arbitrary processes.
</synopsis>
<product type="ebuild">keepalived</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>371469</bug>
<access>local</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1784">CVE-2011-1784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1784">CVE-2011-1784</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 19:50:31 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:28:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T19:50:31Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:28:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-08.xml b/glsa-201207-08.xml
index 592c49e8..503dc2fd 100644
--- a/glsa-201207-08.xml
+++ b/glsa-201207-08.xml
@@ -7,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">Gnash</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>391283</bug>
<bug>408209</bug>
<access>local, remote</access>
@@ -53,9 +53,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4328">CVE-2011-4328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1175">CVE-2012-1175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4328">CVE-2011-4328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1175">CVE-2012-1175</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 23:44:44 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:29:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T23:44:44Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:29:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-09.xml b/glsa-201207-09.xml
index 2cc9e991..7d0c8e7e 100644
--- a/glsa-201207-09.xml
+++ b/glsa-201207-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mod_fcgid</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>344685</bug>
<bug>409373</bug>
<access>local, remote</access>
@@ -55,11 +55,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3872">CVE-2010-3872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1181">CVE-2012-1181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3872">CVE-2010-3872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1181">CVE-2012-1181</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:33:49 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:33:49Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201207-10.xml b/glsa-201207-10.xml
index 0393d13f..661e4194 100644
--- a/glsa-201207-10.xml
+++ b/glsa-201207-10.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code or local privilege escalation.
</synopsis>
<product type="ebuild">cups</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>295256</bug>
<bug>308045</bug>
<bug>325551</bug>
@@ -53,39 +53,39 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3553">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3553">
CVE-2009-3553
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0302">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0302">
CVE-2010-0302
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0393">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0393">
CVE-2010-0393
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0540">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0540">
CVE-2010-0540
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0542">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0542">
CVE-2010-0542
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1748">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1748">
CVE-2010-1748
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2431">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2431">
CVE-2010-2431
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2432">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2432">
CVE-2010-2432
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2941">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2941">
CVE-2010-2941
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3170">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3170">
CVE-2011-3170
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:16 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:16Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:33:59 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-07-09T23:33:59Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/glsa-201208-01.xml b/glsa-201208-01.xml
index 61d9c3a2..0e2bcf01 100644
--- a/glsa-201208-01.xml
+++ b/glsa-201208-01.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">socat</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>415977</bug>
<access>local, remote</access>
<affected>
@@ -41,11 +41,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219">CVE-2012-0219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219">CVE-2012-0219</uri>
<uri link="http://www.dest-unreach.org/socat/contrib/socat-secadv3.html">
Socat security advisory 3
</uri>
</references>
- <metadata timestamp="Wed, 11 Jul 2012 21:57:34 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:08 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-11T21:57:34Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:08Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201208-02.xml b/glsa-201208-02.xml
index d5291818..6832ec91 100644
--- a/glsa-201208-02.xml
+++ b/glsa-201208-02.xml
@@ -6,8 +6,8 @@
which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Puppet</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>410857</bug>
<access>local</access>
<affected>
@@ -61,12 +61,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1906">CVE-2012-1906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1986">CVE-2012-1986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1987">CVE-2012-1987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1988">CVE-2012-1988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1989">CVE-2012-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1906">CVE-2012-1906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1986">CVE-2012-1986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1987">CVE-2012-1987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1988">CVE-2012-1988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1989">CVE-2012-1989</uri>
</references>
- <metadata timestamp="Thu, 12 Apr 2012 20:04:53 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:25 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-12T20:04:53Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:25Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201208-03.xml b/glsa-201208-03.xml
index e1a92e79..61885e5f 100644
--- a/glsa-201208-03.xml
+++ b/glsa-201208-03.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>423719</bug>
<bug>426204</bug>
<bug>429174</bug>
@@ -46,42 +46,42 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2815">CVE-2012-2815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2817">CVE-2012-2817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2818">CVE-2012-2818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2819">CVE-2012-2819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2820">CVE-2012-2820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2821">CVE-2012-2821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2823">CVE-2012-2823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2824">CVE-2012-2824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2825">CVE-2012-2825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2826">CVE-2012-2826</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2829">CVE-2012-2829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2830">CVE-2012-2830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2831">CVE-2012-2831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2834">CVE-2012-2834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2842">CVE-2012-2842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2843">CVE-2012-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2846">CVE-2012-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2847">CVE-2012-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2848">CVE-2012-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2849">CVE-2012-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2853">CVE-2012-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2854">CVE-2012-2854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2857">CVE-2012-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2858">CVE-2012-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2815">CVE-2012-2815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2817">CVE-2012-2817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2818">CVE-2012-2818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2819">CVE-2012-2819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2820">CVE-2012-2820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2821">CVE-2012-2821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2823">CVE-2012-2823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2824">CVE-2012-2824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2825">CVE-2012-2825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2826">CVE-2012-2826</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2829">CVE-2012-2829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2830">CVE-2012-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2831">CVE-2012-2831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2834">CVE-2012-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2842">CVE-2012-2842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2843">CVE-2012-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2846">CVE-2012-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2847">CVE-2012-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2848">CVE-2012-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2849">CVE-2012-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2853">CVE-2012-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2854">CVE-2012-2854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2857">CVE-2012-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2858">CVE-2012-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html">
Release Notes 20.0.1132.43
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html">
Release Notes 20.0.1132.57
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html">
Release Notes 21.0.1180.57
</uri>
</references>
- <metadata timestamp="Wed, 27 Jun 2012 21:59:02 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:39 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-27T21:59:02Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:39Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201208-04.xml b/glsa-201208-04.xml
index 63b09a1f..d687b3d2 100644
--- a/glsa-201208-04.xml
+++ b/glsa-201208-04.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gajim</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>411269</bug>
<bug>412215</bug>
<access>local, remote</access>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2085">CVE-2012-2085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2086">CVE-2012-2086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2093">CVE-2012-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2085">CVE-2012-2085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2086">CVE-2012-2086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2093">CVE-2012-2093</uri>
</references>
- <metadata timestamp="Tue, 10 Jul 2012 21:42:30 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:50 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-10T21:42:30Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:50Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201208-05.xml b/glsa-201208-05.xml
index 1da1bc16..70608514 100644
--- a/glsa-201208-05.xml
+++ b/glsa-201208-05.xml
@@ -6,8 +6,8 @@
Config-IniFiles module, possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Config-IniFiles</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>414485</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2451">CVE-2012-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2451">CVE-2012-2451</uri>
</references>
- <metadata timestamp="Wed, 23 May 2012 02:55:46 +0000" tag="requester">
+ <metadata timestamp="2012-05-23T02:55:46Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:31:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:31:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201208-06.xml b/glsa-201208-06.xml
index d6dc7f20..0a44a534 100644
--- a/glsa-201208-06.xml
+++ b/glsa-201208-06.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">libgdata</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>408245</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1177">CVE-2012-1177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1177">CVE-2012-1177</uri>
</references>
- <metadata timestamp="Tue, 17 Apr 2012 00:40:07 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:31:17 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T00:40:07Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:31:17Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/glsa-201209-01.xml b/glsa-201209-01.xml
index 82f1415c..4b0f35cb 100644
--- a/glsa-201209-01.xml
+++ b/glsa-201209-01.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 05, 2012</announced>
- <revised>September 05, 2012: 2</revised>
+ <announced>2012-09-05</announced>
+ <revised>2012-09-05: 2</revised>
<bug>431432</bug>
<bug>432286</bug>
<access>remote</access>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1535">CVE-2012-1535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4163">CVE-2012-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4164">CVE-2012-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4165">CVE-2012-4165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4166">CVE-2012-4166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4167">CVE-2012-4167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4168">CVE-2012-4168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1535">CVE-2012-1535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4163">CVE-2012-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4164">CVE-2012-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4165">CVE-2012-4165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4166">CVE-2012-4166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4167">CVE-2012-4167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4168">CVE-2012-4168</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Aug 2012 08:47:55 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Sep 2012 01:17:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-17T08:47:55Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2012-09-05T01:17:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-02.xml b/glsa-201209-02.xml
index 6ff3e6e9..f5ede1ee 100644
--- a/glsa-201209-02.xml
+++ b/glsa-201209-02.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>September 23, 2012</announced>
- <revised>June 02, 2014: 6</revised>
+ <announced>2012-09-23</announced>
+ <revised>2014-06-02: 6</revised>
<bug>307001</bug>
<bug>324885</bug>
<bug>357271</bug>
@@ -62,34 +62,34 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2347">CVE-2009-2347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5022">CVE-2009-5022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1411">CVE-2010-1411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2065">CVE-2010-2065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2067">CVE-2010-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2233">CVE-2010-2233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2443">CVE-2010-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2481">CVE-2010-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2482">CVE-2010-2482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2483">CVE-2010-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2595">CVE-2010-2595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2596">CVE-2010-2596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2597">CVE-2010-2597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2630">CVE-2010-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2631">CVE-2010-2631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3087">CVE-2010-3087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4665">CVE-2010-4665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1173">CVE-2012-1173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2088">CVE-2012-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2113">CVE-2012-2113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3401">CVE-2012-3401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2347">CVE-2009-2347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5022">CVE-2009-5022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1411">CVE-2010-1411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2065">CVE-2010-2065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2067">CVE-2010-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2233">CVE-2010-2233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2443">CVE-2010-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2481">CVE-2010-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2482">CVE-2010-2482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2483">CVE-2010-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2595">CVE-2010-2595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2596">CVE-2010-2596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2597">CVE-2010-2597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2630">CVE-2010-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2631">CVE-2010-2631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3087">CVE-2010-3087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4665">CVE-2010-4665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1173">CVE-2012-1173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2088">CVE-2012-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2113">CVE-2012-2113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3401">CVE-2012-3401</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:10Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jun 2014 14:06:53 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-02T14:06:53Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-03.xml b/glsa-201209-03.xml
index e1718ac3..ad220378 100644
--- a/glsa-201209-03.xml
+++ b/glsa-201209-03.xml
@@ -6,8 +6,8 @@
to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>384301</bug>
<bug>396311</bug>
<bug>396533</bug>
@@ -67,26 +67,26 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398">CVE-2011-1398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379">CVE-2011-3379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566">CVE-2011-4566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885">CVE-2011-4885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057">CVE-2012-0057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788">CVE-2012-0788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789">CVE-2012-0789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830">CVE-2012-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831">CVE-2012-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172">CVE-2012-1172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823">CVE-2012-1823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311">CVE-2012-2311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335">CVE-2012-2335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336">CVE-2012-2336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386">CVE-2012-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688">CVE-2012-2688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365">CVE-2012-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450">CVE-2012-3450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398">CVE-2011-1398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379">CVE-2011-3379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566">CVE-2011-4566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885">CVE-2011-4885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057">CVE-2012-0057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788">CVE-2012-0788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789">CVE-2012-0789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830">CVE-2012-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831">CVE-2012-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172">CVE-2012-1172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823">CVE-2012-1823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311">CVE-2012-2311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335">CVE-2012-2335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336">CVE-2012-2336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386">CVE-2012-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688">CVE-2012-2688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365">CVE-2012-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450">CVE-2012-3450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jan 2012 08:58:04 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 00:00:49 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-17T08:58:04Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T00:00:49Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-04.xml b/glsa-201209-04.xml
index 708d346c..3a8c08f1 100644
--- a/glsa-201209-04.xml
+++ b/glsa-201209-04.xml
@@ -6,8 +6,8 @@
which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>402661</bug>
<bug>419637</bug>
<bug>427966</bug>
@@ -56,12 +56,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1033">CVE-2012-1033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1667">CVE-2012-1667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3817">CVE-2012-3817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3868">CVE-2012-3868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4244">CVE-2012-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1033">CVE-2012-1033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1667">CVE-2012-1667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3817">CVE-2012-3817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3868">CVE-2012-3868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4244">CVE-2012-4244</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:12:32 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 00:04:59 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:12:32Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T00:04:59Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-05.xml b/glsa-201209-05.xml
index 357b4656..244e3690 100644
--- a/glsa-201209-05.xml
+++ b/glsa-201209-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">libreoffice</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>386081</bug>
<bug>409455</bug>
<bug>416457</bug>
@@ -73,13 +73,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 May 2012 03:12:45 +0000">
+ <metadata tag="requester" timestamp="2012-05-25T03:12:45Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 10:36:10 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T10:36:10Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-06.xml b/glsa-201209-06.xml
index 3e556afe..4be3bd83 100644
--- a/glsa-201209-06.xml
+++ b/glsa-201209-06.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">expat</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>280615</bug>
<bug>303727</bug>
<bug>407519</bug>
@@ -48,14 +48,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560">CVE-2009-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720">CVE-2009-3720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876">CVE-2012-0876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147">CVE-2012-1147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148">CVE-2012-1148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560">CVE-2009-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720">CVE-2009-3720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876">CVE-2012-0876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147">CVE-2012-1147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148">CVE-2012-1148</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:05:51 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:05:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 10:37:12 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T10:37:12Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-07.xml b/glsa-201209-07.xml
index f028c3f8..2ef1339b 100644
--- a/glsa-201209-07.xml
+++ b/glsa-201209-07.xml
@@ -8,8 +8,8 @@
result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>394201</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4599">CVE-2011-4599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4599">CVE-2011-4599</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2012 15:27:29 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 23:23:13 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-06-07T15:27:29Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T23:23:13Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-08.xml b/glsa-201209-08.xml
index c4e97751..2d1f8082 100644
--- a/glsa-201209-08.xml
+++ b/glsa-201209-08.xml
@@ -4,8 +4,8 @@
<title>SquidClamav: Denial of Service</title>
<synopsis>A vulnerability in SquidClamav may result in Denial of Service.</synopsis>
<product type="ebuild">squidclamav</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>428778</bug>
<access>remote</access>
<affected>
@@ -39,11 +39,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3501">CVE-2012-3501</uri>
- <uri link="http://squidclamav.darold.net/news.html">SquidClamav News</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3501">CVE-2012-3501</uri>
+ <uri link="https://squidclamav.darold.net/news.html">SquidClamav News</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:12:43 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:12:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 23:23:20 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T23:23:20Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-09.xml b/glsa-201209-09.xml
index e49fb76f..bad91a17 100644
--- a/glsa-201209-09.xml
+++ b/glsa-201209-09.xml
@@ -6,8 +6,8 @@
of Service or a bypass of security restrictions.
</synopsis>
<product type="ebuild">atheme</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>409103</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1576">CVE-2012-1576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1576">CVE-2012-1576</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:09:52 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:09:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 10:53:52 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T10:53:52Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-10.xml b/glsa-201209-10.xml
index 0d5b9dba..c777af60 100644
--- a/glsa-201209-10.xml
+++ b/glsa-201209-10.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">calligra</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>428890</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456">CVE-2012-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456">CVE-2012-3456</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Aug 2012 20:25:04 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 10:54:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-09T20:25:04Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T10:54:01Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-11.xml b/glsa-201209-11.xml
index b24cb4c1..b41047f0 100644
--- a/glsa-201209-11.xml
+++ b/glsa-201209-11.xml
@@ -6,8 +6,8 @@
which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>429478</bug>
<bug>434584</bug>
<access>remote</access>
@@ -47,16 +47,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4010">CVE-2012-4010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4142">CVE-2012-4142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4143">CVE-2012-4143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4144">CVE-2012-4144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4145">CVE-2012-4145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4146">CVE-2012-4146</uri>
- <uri link="http://www.opera.com/docs/changelogs/unix/1201/">Opera 12.01 for
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4010">CVE-2012-4010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4142">CVE-2012-4142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4143">CVE-2012-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4144">CVE-2012-4144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4145">CVE-2012-4145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4146">CVE-2012-4146</uri>
+ <uri link="https://www.opera.com/docs/changelogs/unix/1201/">Opera 12.01 for
UNIX changelog
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Aug 2012 11:42:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 21:25:23 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-03T11:42:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T21:25:23Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-12.xml b/glsa-201209-12.xml
index 87fa78cd..cebb109c 100644
--- a/glsa-201209-12.xml
+++ b/glsa-201209-12.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>409031</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1569">CVE-2012-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1569">CVE-2012-1569</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:07:38 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:07:38Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 21:25:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T21:25:29Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-13.xml b/glsa-201209-13.xml
index ec2b5db0..7dfa02c1 100644
--- a/glsa-201209-13.xml
+++ b/glsa-201209-13.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>426938</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2806">CVE-2012-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2806">CVE-2012-2806</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 17:28:52 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 11:11:07 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T17:28:52Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T11:11:07Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-14.xml b/glsa-201209-14.xml
index f6555501..ac0308a1 100644
--- a/glsa-201209-14.xml
+++ b/glsa-201209-14.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service.</synopsis>
<product type="ebuild">file</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>427368</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1571">CVE-2012-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1571">CVE-2012-1571</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 16:44:09 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 11:11:29 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T16:44:09Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T11:11:29Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-15.xml b/glsa-201209-15.xml
index f0e61cb3..ca9637fa 100644
--- a/glsa-201209-15.xml
+++ b/glsa-201209-15.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>425050</bug>
<bug>433750</bug>
<access>remote</access>
@@ -54,13 +54,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186">CVE-2012-2186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812">CVE-2012-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863">CVE-2012-3863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737">CVE-2012-4737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186">CVE-2012-2186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812">CVE-2012-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863">CVE-2012-3863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737">CVE-2012-4737</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 15:47:40 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T15:47:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 21:43:31 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T21:43:31Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-16.xml b/glsa-201209-16.xml
index c1e439e5..6c4ca06b 100644
--- a/glsa-201209-16.xml
+++ b/glsa-201209-16.xml
@@ -6,8 +6,8 @@
conduct SQL injection.
</synopsis>
<product type="ebuild">sqlalchemy</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>407437</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0805">CVE-2012-0805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0805">CVE-2012-0805</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:04:11 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:04:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 21:43:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T21:43:47Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-17.xml b/glsa-201209-17.xml
index 10a8f317..71905cbe 100644
--- a/glsa-201209-17.xml
+++ b/glsa-201209-17.xml
@@ -6,8 +6,8 @@
arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>425076</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3374">CVE-2012-3374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3374">CVE-2012-3374</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 13:28:52 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 11:52:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-20T13:28:52Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T11:52:16Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-18.xml b/glsa-201209-18.xml
index 839a29a8..855dfa3f 100644
--- a/glsa-201209-18.xml
+++ b/glsa-201209-18.xml
@@ -6,8 +6,8 @@
lead to SQL injection or cross-site scripting attacks.
</synopsis>
<product type="ebuild">postfixadmin</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>400971</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0811">CVE-2012-0811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0812">CVE-2012-0812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0811">CVE-2012-0811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0812">CVE-2012-0812</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:01:37 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:01:37Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 11:52:28 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T11:52:28Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-19.xml b/glsa-201209-19.xml
index 4f9ce6e4..a82a16aa 100644
--- a/glsa-201209-19.xml
+++ b/glsa-201209-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">nut</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>419377</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2944">CVE-2012-2944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2944">CVE-2012-2944</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 13:16:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 19:53:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-20T13:16:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T19:53:02Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-20.xml b/glsa-201209-20.xml
index 5e4a0928..934ff2a5 100644
--- a/glsa-201209-20.xml
+++ b/glsa-201209-20.xml
@@ -4,8 +4,8 @@
<title>mod_rpaf: Denial of Service</title>
<synopsis>A vulnerability in mod_rpaf may result in Denial of Service.</synopsis>
<product type="ebuild">mod_rpaf</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>432406</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3526">CVE-2012-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3526">CVE-2012-3526</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Sep 2012 10:41:24 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 19:53:08 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-19T10:41:24Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T19:53:08Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-21.xml b/glsa-201209-21.xml
index 65e2f41e..2e871464 100644
--- a/glsa-201209-21.xml
+++ b/glsa-201209-21.xml
@@ -6,8 +6,8 @@
allowing remote attackers to create or overwrite arbitrary files.
</synopsis>
<product type="ebuild">fastjar</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>325557</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0831">CVE-2010-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2322">CVE-2010-2322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0831">CVE-2010-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2322">CVE-2010-2322</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:29 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 00:34:46 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:29Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T00:34:46Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-22.xml b/glsa-201209-22.xml
index 1322f116..7f0ca963 100644
--- a/glsa-201209-22.xml
+++ b/glsa-201209-22.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">libgssglue</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>385321</bug>
<access>local</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2709">CVE-2011-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2709">CVE-2011-2709</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Sep 2012 12:06:10 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 00:34:59 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-09T12:06:10Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T00:34:59Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-23.xml b/glsa-201209-23.xml
index c4755d61..f915ab61 100644
--- a/glsa-201209-23.xml
+++ b/glsa-201209-23.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>293127</bug>
<bug>350915</bug>
<bug>372975</bug>
@@ -47,17 +47,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1570">CVE-2009-1570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3909">CVE-2009-3909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4540">CVE-2010-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4541">CVE-2010-4541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4542">CVE-2010-4542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4543">CVE-2010-4543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1178">CVE-2011-1178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2896">CVE-2011-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2763">CVE-2012-2763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3402">CVE-2012-3402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1570">CVE-2009-1570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3909">CVE-2009-3909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4540">CVE-2010-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4541">CVE-2010-4541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4542">CVE-2010-4542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4543">CVE-2010-4543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1178">CVE-2011-1178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2896">CVE-2011-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2763">CVE-2012-2763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3402">CVE-2012-3402</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:15 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 11:27:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:15Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T11:27:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-24.xml b/glsa-201209-24.xml
index d360b59f..2598c93f 100644
--- a/glsa-201209-24.xml
+++ b/glsa-201209-24.xml
@@ -7,8 +7,8 @@
</synopsis>
<product type="ebuild">PostgreSQL</product>
- <announced>September 28, 2012</announced>
- <revised>January 20, 2014: 2</revised>
+ <announced>2012-09-28</announced>
+ <revised>2014-01-20: 2</revised>
<bug>406037</bug>
<bug>419727</bug>
<bug>431766</bug>
@@ -87,16 +87,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0866">CVE-2012-0866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0867">CVE-2012-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0868">CVE-2012-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2655">CVE-2012-2655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3488">CVE-2012-3488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3489">CVE-2012-3489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0866">CVE-2012-0866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0867">CVE-2012-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0868">CVE-2012-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2655">CVE-2012-2655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3488">CVE-2012-3488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3489">CVE-2012-3489</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Apr 2012 15:26:13 +0000">
+ <metadata tag="requester" timestamp="2012-04-08T15:26:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 09:36:28 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T09:36:28Z">ackle</metadata>
</glsa>
diff --git a/glsa-201209-25.xml b/glsa-201209-25.xml
index 8e5009ee..422b2602 100644
--- a/glsa-201209-25.xml
+++ b/glsa-201209-25.xml
@@ -8,8 +8,8 @@
code, and a Denial of Service.
</synopsis>
<product type="ebuild">vmware-server vmware-player vmware-workstation</product>
- <announced>September 29, 2012</announced>
- <revised>September 29, 2012: 2</revised>
+ <announced>2012-09-29</announced>
+ <revised>2012-09-29: 2</revised>
<bug>213548</bug>
<bug>224637</bug>
<bug>236167</bug>
@@ -98,112 +98,112 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5503 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5503 ">
CVE-2007-5503
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5671 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5671 ">
CVE-2007-5671
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0967 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0967 ">
CVE-2008-0967
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1340 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1340 ">
CVE-2008-1340
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1361 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1361 ">
CVE-2008-1361
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1362 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1362 ">
CVE-2008-1362
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1363 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1363 ">
CVE-2008-1363
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1364 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1364 ">
CVE-2008-1364
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1392 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1392 ">
CVE-2008-1392
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1447 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1447 ">
CVE-2008-1447
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1806 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1806 ">
CVE-2008-1806
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1807 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1807 ">
CVE-2008-1807
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1808 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1808 ">
CVE-2008-1808
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2098 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2098 ">
CVE-2008-2098
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2100 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2100 ">
CVE-2008-2100
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2101 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2101 ">
CVE-2008-2101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4915 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4915 ">
CVE-2008-4915
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4916 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4916 ">
CVE-2008-4916
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4917 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4917 ">
CVE-2008-4917
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040 ">
CVE-2009-0040
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0909 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0909 ">
CVE-2009-0909
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0910 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0910 ">
CVE-2009-0910
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1244">CVE-2009-1244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2267 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1244">CVE-2009-1244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2267 ">
CVE-2009-2267
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3707 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3707 ">
CVE-2009-3707
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3732 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3732 ">
CVE-2009-3732
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3733 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3733 ">
CVE-2009-3733
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4811 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4811 ">
CVE-2009-4811
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1137 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1137 ">
CVE-2010-1137
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1138 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1138 ">
CVE-2010-1138
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1139 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1139 ">
CVE-2010-1139
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1140 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1140 ">
CVE-2010-1140
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1141 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1141 ">
CVE-2010-1141
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1142 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1142 ">
CVE-2010-1142
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1143 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1143 ">
CVE-2010-1143
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3868">CVE-2011-3868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3868">CVE-2011-3868</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:01 +0000">system</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2012 13:12:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:01Z">system</metadata>
+ <metadata tag="submitter" timestamp="2012-09-29T13:12:45Z">ackle</metadata>
</glsa>
diff --git a/glsa-201210-01.xml b/glsa-201210-01.xml
index a801679f..9b2be147 100644
--- a/glsa-201210-01.xml
+++ b/glsa-201210-01.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>325431</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2074">CVE-2010-2074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2074">CVE-2010-2074</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:00 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:42:33 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:00Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:42:33Z">craig</metadata>
</glsa>
diff --git a/glsa-201210-02.xml b/glsa-201210-02.xml
index 9d804f19..2953f4d5 100644
--- a/glsa-201210-02.xml
+++ b/glsa-201210-02.xml
@@ -6,8 +6,8 @@
which allowing for injection of arbitrary web script or HTML.
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>305663</bug>
<bug>339295</bug>
<access>remote</access>
@@ -46,16 +46,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0668">CVE-2010-0668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0669">CVE-2010-0669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0717">CVE-2010-0717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0828">CVE-2010-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1238">CVE-2010-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2487">CVE-2010-2487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2969">CVE-2010-2969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2970">CVE-2010-2970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1058">CVE-2011-1058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0668">CVE-2010-0668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0669">CVE-2010-0669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0717">CVE-2010-0717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0828">CVE-2010-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1238">CVE-2010-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2487">CVE-2010-2487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2969">CVE-2010-2969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2970">CVE-2010-2970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1058">CVE-2011-1058</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:36:59 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:46:53 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:36:59Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:46:53Z">craig</metadata>
</glsa>
diff --git a/glsa-201210-03.xml b/glsa-201210-03.xml
index 3deaeb2d..2377f25c 100644
--- a/glsa-201210-03.xml
+++ b/glsa-201210-03.xml
@@ -6,8 +6,8 @@
overwrite arbitrary files has been found in rdesktop.
</synopsis>
<product type="ebuild">rdesktop</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>364191</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1595">CVE-2011-1595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1595">CVE-2011-1595</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:47:56 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:47:56Z">craig</metadata>
</glsa>
diff --git a/glsa-201210-04.xml b/glsa-201210-04.xml
index a114d20f..ed78e07e 100644
--- a/glsa-201210-04.xml
+++ b/glsa-201210-04.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ebuild</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>364889</bug>
<bug>365259</bug>
<bug>372411</bug>
@@ -49,13 +49,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1750">CVE-2011-1750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1751">CVE-2011-1751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2212">CVE-2011-2212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2512">CVE-2011-2512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0029">CVE-2012-0029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2652">CVE-2012-2652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1750">CVE-2011-1750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1751">CVE-2011-1751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2212">CVE-2011-2212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2512">CVE-2011-2512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0029">CVE-2012-0029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2652">CVE-2012-2652</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:53 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:48:30 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:53Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:48:30Z">craig</metadata>
</glsa>
diff --git a/glsa-201210-05.xml b/glsa-201210-05.xml
index 0ed0fbb7..5d61a182 100644
--- a/glsa-201210-05.xml
+++ b/glsa-201210-05.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>October 20, 2012</announced>
- <revised>October 20, 2012: 1</revised>
+ <announced>2012-10-20</announced>
+ <revised>2012-10-20: 1</revised>
<bug>251319</bug>
<bug>431850</bug>
<access>local</access>
@@ -56,11 +56,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5374">CVE-2008-5374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3410">CVE-2012-3410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5374">CVE-2008-5374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3410">CVE-2012-3410</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2012 16:02:06 +0000">
+ <metadata tag="requester" timestamp="2012-09-04T16:02:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Oct 2012 00:12:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-10-20T00:12:47Z">ackle</metadata>
</glsa>
diff --git a/glsa-201210-06.xml b/glsa-201210-06.xml
index 3a59ad06..39ac325d 100644
--- a/glsa-201210-06.xml
+++ b/glsa-201210-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>October 20, 2012</announced>
- <revised>October 20, 2012: 1</revised>
+ <announced>2012-10-20</announced>
+ <revised>2012-10-20: 1</revised>
<bug>408555</bug>
<bug>422537</bug>
<access>remote</access>
@@ -46,22 +46,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0848">CVE-2012-0848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0851">CVE-2012-0851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0852">CVE-2012-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0853">CVE-2012-0853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0858">CVE-2012-0858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0848">CVE-2012-0848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0851">CVE-2012-0851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0852">CVE-2012-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0853">CVE-2012-0853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0858">CVE-2012-0858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 May 2012 20:28:38 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Oct 2012 00:14:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-05-01T20:28:38Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-10-20T00:14:06Z">ackle</metadata>
</glsa>
diff --git a/glsa-201210-07.xml b/glsa-201210-07.xml
index 2dc4761e..3b79f41c 100644
--- a/glsa-201210-07.xml
+++ b/glsa-201210-07.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>October 21, 2012</announced>
- <revised>October 21, 2012: 1</revised>
+ <announced>2012-10-21</announced>
+ <revised>2012-10-21: 1</revised>
<bug>433551</bug>
<bug>436234</bug>
<bug>437664</bug>
@@ -48,56 +48,56 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865">CVE-2012-2865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866">CVE-2012-2866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867">CVE-2012-2867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868">CVE-2012-2868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869">CVE-2012-2869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872">CVE-2012-2872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874">CVE-2012-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876">CVE-2012-2876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877">CVE-2012-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878">CVE-2012-2878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879">CVE-2012-2879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880">CVE-2012-2880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881">CVE-2012-2881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882">CVE-2012-2882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883">CVE-2012-2883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884">CVE-2012-2884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885">CVE-2012-2885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886">CVE-2012-2886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887">CVE-2012-2887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888">CVE-2012-2888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889">CVE-2012-2889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891">CVE-2012-2891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892">CVE-2012-2892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894">CVE-2012-2894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896">CVE-2012-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900">CVE-2012-2900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108">CVE-2012-5108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110">CVE-2012-5110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111">CVE-2012-5111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112">CVE-2012-5112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376">CVE-2012-5376</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865">CVE-2012-2865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866">CVE-2012-2866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867">CVE-2012-2867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868">CVE-2012-2868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869">CVE-2012-2869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872">CVE-2012-2872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874">CVE-2012-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876">CVE-2012-2876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877">CVE-2012-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878">CVE-2012-2878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879">CVE-2012-2879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880">CVE-2012-2880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881">CVE-2012-2881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882">CVE-2012-2882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883">CVE-2012-2883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884">CVE-2012-2884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885">CVE-2012-2885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886">CVE-2012-2886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887">CVE-2012-2887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888">CVE-2012-2888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889">CVE-2012-2889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891">CVE-2012-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892">CVE-2012-2892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894">CVE-2012-2894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896">CVE-2012-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900">CVE-2012-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108">CVE-2012-5108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110">CVE-2012-5110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111">CVE-2012-5111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112">CVE-2012-5112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376">CVE-2012-5376</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html">
Release Notes 21.0.1180.89
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html">
Release Notes 22.0.1229.79
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html">
Release Notes 22.0.1229.92
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html">
Release Notes 22.0.1229.94
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Sep 2012 13:01:44 +0000">
+ <metadata tag="requester" timestamp="2012-09-06T13:01:44Z">
phajdan.jr
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2012 15:03:00 +0000">
+ <metadata tag="submitter" timestamp="2012-10-21T15:03:00Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201211-01.xml b/glsa-201211-01.xml
index 70fe2b21..29b80098 100644
--- a/glsa-201211-01.xml
+++ b/glsa-201211-01.xml
@@ -6,8 +6,8 @@
which allowing for local file inclusion.
</synopsis>
<product type="ebuild">MantisBT</product>
- <announced>November 08, 2012</announced>
- <revised>November 08, 2012: 1</revised>
+ <announced>2012-11-08</announced>
+ <revised>2012-11-08: 1</revised>
<bug>348761</bug>
<bug>381417</bug>
<bug>386153</bug>
@@ -49,30 +49,30 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3303">CVE-2010-3303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3763">CVE-2010-3763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4348">CVE-2010-4348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4349">CVE-2010-4349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4350">CVE-2010-4350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2938">CVE-2011-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3356">CVE-2011-3356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3357">CVE-2011-3357</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3358">CVE-2011-3358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3578">CVE-2011-3578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3755">CVE-2011-3755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1118">CVE-2012-1118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1119">CVE-2012-1119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1120">CVE-2012-1120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1121">CVE-2012-1121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1122">CVE-2012-1122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1123">CVE-2012-1123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2691">CVE-2012-2691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2692">CVE-2012-2692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3303">CVE-2010-3303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3763">CVE-2010-3763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4348">CVE-2010-4348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4349">CVE-2010-4349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4350">CVE-2010-4350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2938">CVE-2011-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3356">CVE-2011-3356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3357">CVE-2011-3357</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3358">CVE-2011-3358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3578">CVE-2011-3578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3755">CVE-2011-3755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1118">CVE-2012-1118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1119">CVE-2012-1119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1120">CVE-2012-1120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1121">CVE-2012-1121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1122">CVE-2012-1122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1123">CVE-2012-1123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2691">CVE-2012-2691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2692">CVE-2012-2692</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Nov 2012 10:37:33 +0000">
+ <metadata tag="submitter" timestamp="2012-11-08T10:37:33Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201301-01.xml b/glsa-201301-01.xml
index 6be2552d..38d3b766 100644
--- a/glsa-201301-01.xml
+++ b/glsa-201301-01.xml
@@ -7,8 +7,8 @@
allow execution of arbitrary code or local privilege escalation.
</synopsis>
<product type="ebuild">firefox</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>180159</bug>
<bug>181361</bug>
<bug>207261</bug>
@@ -293,953 +293,953 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101">
CVE-2011-3101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436">CVE-2007-2436
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436">CVE-2007-2436
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437">CVE-2007-2437
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437">CVE-2007-2437
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671">CVE-2007-2671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073">CVE-2007-3073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016">CVE-2008-0016
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671">CVE-2007-2671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073">CVE-2007-3073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016">CVE-2008-0016
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017">CVE-2008-0017
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017">CVE-2008-0017
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367">CVE-2008-0367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835">CVE-2008-3835
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367">CVE-2008-0367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835">CVE-2008-3835
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836">CVE-2008-3836
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836">CVE-2008-3836
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837">CVE-2008-3837
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837">CVE-2008-3837
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058">CVE-2008-4058
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058">CVE-2008-4058
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059">CVE-2008-4059
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059">CVE-2008-4059
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060">CVE-2008-4060
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060">CVE-2008-4060
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061">CVE-2008-4061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061">CVE-2008-4061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062">CVE-2008-4062
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062">CVE-2008-4062
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063">CVE-2008-4063
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063">CVE-2008-4063
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064">CVE-2008-4064
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064">CVE-2008-4064
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065">CVE-2008-4065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065">CVE-2008-4065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066">CVE-2008-4066
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066">CVE-2008-4066
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067">CVE-2008-4067
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067">CVE-2008-4067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068">CVE-2008-4068
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068">CVE-2008-4068
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069">CVE-2008-4069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069">CVE-2008-4069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070">CVE-2008-4070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070">CVE-2008-4070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582">CVE-2008-4582
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582">CVE-2008-4582
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012">CVE-2008-5012
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012">CVE-2008-5012
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013">CVE-2008-5013
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013">CVE-2008-5013
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014">CVE-2008-5014
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014">CVE-2008-5014
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015">CVE-2008-5015
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015">CVE-2008-5015
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016">CVE-2008-5016
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016">CVE-2008-5016
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017">CVE-2008-5017
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017">CVE-2008-5017
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018">CVE-2008-5018
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018">CVE-2008-5018
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019">CVE-2008-5019
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019">CVE-2008-5019
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021">CVE-2008-5021
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021">CVE-2008-5021
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022">CVE-2008-5022
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022">CVE-2008-5022
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023">CVE-2008-5023
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023">CVE-2008-5023
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024">CVE-2008-5024
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024">CVE-2008-5024
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052">CVE-2008-5052
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052">CVE-2008-5052
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500">CVE-2008-5500
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500">CVE-2008-5500
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501">CVE-2008-5501
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501">CVE-2008-5501
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502">CVE-2008-5502
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502">CVE-2008-5502
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503">CVE-2008-5503
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503">CVE-2008-5503
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504">CVE-2008-5504
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504">CVE-2008-5504
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505">CVE-2008-5505
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505">CVE-2008-5505
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506">CVE-2008-5506
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506">CVE-2008-5506
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507">CVE-2008-5507
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507">CVE-2008-5507
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508">CVE-2008-5508
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508">CVE-2008-5508
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510">CVE-2008-5510
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510">CVE-2008-5510
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511">CVE-2008-5511
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511">CVE-2008-5511
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512">CVE-2008-5512
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512">CVE-2008-5512
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513">CVE-2008-5513
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513">CVE-2008-5513
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822">CVE-2008-5822
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822">CVE-2008-5822
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913">CVE-2008-5913
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913">CVE-2008-5913
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961">CVE-2008-6961
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961">CVE-2008-6961
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352">CVE-2009-0352
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352">CVE-2009-0352
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353">CVE-2009-0353
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353">CVE-2009-0353
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354">CVE-2009-0354
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354">CVE-2009-0354
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355">CVE-2009-0355
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355">CVE-2009-0355
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356">CVE-2009-0356
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356">CVE-2009-0356
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357">CVE-2009-0357
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357">CVE-2009-0357
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358">CVE-2009-0358
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358">CVE-2009-0358
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652">CVE-2009-0652
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652">CVE-2009-0652
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771">CVE-2009-0771
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771">CVE-2009-0771
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772">CVE-2009-0772
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772">CVE-2009-0772
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773">CVE-2009-0773
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773">CVE-2009-0773
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774">CVE-2009-0774
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774">CVE-2009-0774
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775">CVE-2009-0775
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775">CVE-2009-0775
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776">CVE-2009-0776
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776">CVE-2009-0776
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777">CVE-2009-0777
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777">CVE-2009-0777
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044">CVE-2009-1044
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044">CVE-2009-1044
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169">CVE-2009-1169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169">CVE-2009-1169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302">CVE-2009-1302
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302">CVE-2009-1302
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303">CVE-2009-1303
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303">CVE-2009-1303
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304">CVE-2009-1304
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304">CVE-2009-1304
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305">CVE-2009-1305
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305">CVE-2009-1305
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306">CVE-2009-1306
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306">CVE-2009-1306
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307">CVE-2009-1307
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307">CVE-2009-1307
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308">CVE-2009-1308
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308">CVE-2009-1308
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309">CVE-2009-1309
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309">CVE-2009-1309
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310">CVE-2009-1310
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310">CVE-2009-1310
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311">CVE-2009-1311
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311">CVE-2009-1311
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312">CVE-2009-1312
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312">CVE-2009-1312
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313">CVE-2009-1313
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313">CVE-2009-1313
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392">CVE-2009-1392
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392">CVE-2009-1392
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563">CVE-2009-1563
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563">CVE-2009-1563
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571">CVE-2009-1571
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571">CVE-2009-1571
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828">CVE-2009-1828
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828">CVE-2009-1828
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832">CVE-2009-1832
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832">CVE-2009-1832
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833">CVE-2009-1833
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833">CVE-2009-1833
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834">CVE-2009-1834
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834">CVE-2009-1834
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835">CVE-2009-1835
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835">CVE-2009-1835
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836">CVE-2009-1836
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836">CVE-2009-1836
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837">CVE-2009-1837
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837">CVE-2009-1837
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838">CVE-2009-1838
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838">CVE-2009-1838
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839">CVE-2009-1839
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839">CVE-2009-1839
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840">CVE-2009-1840
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840">CVE-2009-1840
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841">CVE-2009-1841
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841">CVE-2009-1841
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043">CVE-2009-2043
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043">CVE-2009-2043
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044">CVE-2009-2044
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044">CVE-2009-2044
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061">CVE-2009-2061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061">CVE-2009-2061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065">CVE-2009-2065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065">CVE-2009-2065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210">CVE-2009-2210
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210">CVE-2009-2210
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404">CVE-2009-2404
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404">CVE-2009-2404
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408">CVE-2009-2408
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408">CVE-2009-2408
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462">CVE-2009-2462
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462">CVE-2009-2462
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463">CVE-2009-2463
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463">CVE-2009-2463
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464">CVE-2009-2464
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464">CVE-2009-2464
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465">CVE-2009-2465
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465">CVE-2009-2465
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466">CVE-2009-2466
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466">CVE-2009-2466
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467">CVE-2009-2467
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467">CVE-2009-2467
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469">CVE-2009-2469
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469">CVE-2009-2469
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470">CVE-2009-2470
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470">CVE-2009-2470
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471">CVE-2009-2471
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471">CVE-2009-2471
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472">CVE-2009-2472
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472">CVE-2009-2472
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477">CVE-2009-2477
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477">CVE-2009-2477
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478">CVE-2009-2478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479">CVE-2009-2479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535">CVE-2009-2535
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478">CVE-2009-2478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479">CVE-2009-2479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535">CVE-2009-2535
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654">CVE-2009-2654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654">CVE-2009-2654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662">CVE-2009-2662
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662">CVE-2009-2662
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664">CVE-2009-2664
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664">CVE-2009-2664
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665">CVE-2009-2665
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665">CVE-2009-2665
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069">CVE-2009-3069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069">CVE-2009-3069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070">CVE-2009-3070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070">CVE-2009-3070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071">CVE-2009-3071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071">CVE-2009-3071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072">CVE-2009-3072
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072">CVE-2009-3072
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074">CVE-2009-3074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074">CVE-2009-3074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075">CVE-2009-3075
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075">CVE-2009-3075
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076">CVE-2009-3076
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076">CVE-2009-3076
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077">CVE-2009-3077
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077">CVE-2009-3077
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078">CVE-2009-3078
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078">CVE-2009-3078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079">CVE-2009-3079
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079">CVE-2009-3079
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274">CVE-2009-3274
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274">CVE-2009-3274
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371">CVE-2009-3371
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371">CVE-2009-3371
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372">CVE-2009-3372
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372">CVE-2009-3372
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373">CVE-2009-3373
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373">CVE-2009-3373
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374">CVE-2009-3374
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374">CVE-2009-3374
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375">CVE-2009-3375
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375">CVE-2009-3375
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376">CVE-2009-3376
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376">CVE-2009-3376
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377">CVE-2009-3377
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377">CVE-2009-3377
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378">CVE-2009-3378
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378">CVE-2009-3378
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379">CVE-2009-3379
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379">CVE-2009-3379
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380">CVE-2009-3380
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380">CVE-2009-3380
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381">CVE-2009-3381
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381">CVE-2009-3381
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382">CVE-2009-3382
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382">CVE-2009-3382
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383">CVE-2009-3383
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383">CVE-2009-3383
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388">CVE-2009-3388
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388">CVE-2009-3388
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389">CVE-2009-3389
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389">CVE-2009-3389
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978">CVE-2009-3978
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978">CVE-2009-3978
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979">CVE-2009-3979
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979">CVE-2009-3979
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980">CVE-2009-3980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980">CVE-2009-3980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981">CVE-2009-3981
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981">CVE-2009-3981
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982">CVE-2009-3982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982">CVE-2009-3982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983">CVE-2009-3983
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983">CVE-2009-3983
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984">CVE-2009-3984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984">CVE-2009-3984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985">CVE-2009-3985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985">CVE-2009-3985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986">CVE-2009-3986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986">CVE-2009-3986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987">CVE-2009-3987
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987">CVE-2009-3987
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988">CVE-2009-3988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988">CVE-2009-3988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159">CVE-2010-0159
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159">CVE-2010-0159
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160">CVE-2010-0160
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160">CVE-2010-0160
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162">CVE-2010-0162
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162">CVE-2010-0162
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163">CVE-2010-0163
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163">CVE-2010-0163
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164">CVE-2010-0164
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164">CVE-2010-0164
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165">CVE-2010-0165
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165">CVE-2010-0165
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166">CVE-2010-0166
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166">CVE-2010-0166
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168">CVE-2010-0168
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168">CVE-2010-0168
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170">CVE-2010-0170
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170">CVE-2010-0170
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172">CVE-2010-0172
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172">CVE-2010-0172
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173">CVE-2010-0173
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173">CVE-2010-0173
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177">CVE-2010-0177
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177">CVE-2010-0177
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178">CVE-2010-0178
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178">CVE-2010-0178
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179">CVE-2010-0179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179">CVE-2010-0179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181">CVE-2010-0181
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181">CVE-2010-0181
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182">CVE-2010-0182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182">CVE-2010-0182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183">CVE-2010-0183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183">CVE-2010-0183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220">CVE-2010-0220
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220">CVE-2010-0220
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648">CVE-2010-0648
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648">CVE-2010-0648
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654">CVE-2010-0654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654">CVE-2010-0654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028">CVE-2010-1028
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028">CVE-2010-1028
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121">CVE-2010-1121
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121">CVE-2010-1121
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125">CVE-2010-1125
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125">CVE-2010-1125
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196">CVE-2010-1196
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196">CVE-2010-1196
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197">CVE-2010-1197
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197">CVE-2010-1197
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198">CVE-2010-1198
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198">CVE-2010-1198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199">CVE-2010-1199
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199">CVE-2010-1199
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200">CVE-2010-1200
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200">CVE-2010-1200
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201">CVE-2010-1201
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201">CVE-2010-1201
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202">CVE-2010-1202
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202">CVE-2010-1202
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203">CVE-2010-1203
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203">CVE-2010-1203
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206">CVE-2010-1206
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206">CVE-2010-1206
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207">CVE-2010-1207
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207">CVE-2010-1207
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208">CVE-2010-1208
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208">CVE-2010-1208
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209">CVE-2010-1209
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209">CVE-2010-1209
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210">CVE-2010-1210
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210">CVE-2010-1210
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211">CVE-2010-1211
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211">CVE-2010-1211
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212">CVE-2010-1212
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212">CVE-2010-1212
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213">CVE-2010-1213
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213">CVE-2010-1213
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214">CVE-2010-1214
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214">CVE-2010-1214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215">CVE-2010-1215
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215">CVE-2010-1215
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585">CVE-2010-1585
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585">CVE-2010-1585
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751">CVE-2010-2751
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751">CVE-2010-2751
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752">CVE-2010-2752
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752">CVE-2010-2752
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753">CVE-2010-2753
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753">CVE-2010-2753
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754">CVE-2010-2754
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754">CVE-2010-2754
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755">CVE-2010-2755
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755">CVE-2010-2755
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760">CVE-2010-2760
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760">CVE-2010-2760
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762">CVE-2010-2762
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762">CVE-2010-2762
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763">CVE-2010-2763
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763">CVE-2010-2763
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764">CVE-2010-2764
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764">CVE-2010-2764
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765">CVE-2010-2765
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765">CVE-2010-2765
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766">CVE-2010-2766
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766">CVE-2010-2766
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767">CVE-2010-2767
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767">CVE-2010-2767
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768">CVE-2010-2768
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768">CVE-2010-2768
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769">CVE-2010-2769
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769">CVE-2010-2769
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770">CVE-2010-2770
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770">CVE-2010-2770
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131">CVE-2010-3131
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131">CVE-2010-3131
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166">CVE-2010-3166
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166">CVE-2010-3166
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167">CVE-2010-3167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167">CVE-2010-3167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168">CVE-2010-3168
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168">CVE-2010-3168
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169">CVE-2010-3169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169">CVE-2010-3169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170">CVE-2010-3170
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170">CVE-2010-3170
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171">CVE-2010-3171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171">CVE-2010-3171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173">CVE-2010-3173
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173">CVE-2010-3173
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174">CVE-2010-3174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174">CVE-2010-3174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175">CVE-2010-3175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175">CVE-2010-3175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176">CVE-2010-3176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176">CVE-2010-3176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177">CVE-2010-3177
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177">CVE-2010-3177
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178">CVE-2010-3178
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178">CVE-2010-3178
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179">CVE-2010-3179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179">CVE-2010-3179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180">CVE-2010-3180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180">CVE-2010-3180
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182">CVE-2010-3182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182">CVE-2010-3182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183">CVE-2010-3183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183">CVE-2010-3183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399">CVE-2010-3399
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399">CVE-2010-3399
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400">CVE-2010-3400
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400">CVE-2010-3400
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765">CVE-2010-3765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766">CVE-2010-3766
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765">CVE-2010-3765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766">CVE-2010-3766
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767">CVE-2010-3767
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767">CVE-2010-3767
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768">CVE-2010-3768
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768">CVE-2010-3768
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769">CVE-2010-3769
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769">CVE-2010-3769
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770">CVE-2010-3770
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770">CVE-2010-3770
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771">CVE-2010-3771
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771">CVE-2010-3771
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772">CVE-2010-3772
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772">CVE-2010-3772
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773">CVE-2010-3773
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773">CVE-2010-3773
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774">CVE-2010-3774
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774">CVE-2010-3774
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775">CVE-2010-3775
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775">CVE-2010-3775
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776">CVE-2010-3776
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776">CVE-2010-3776
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777">CVE-2010-3777
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777">CVE-2010-3777
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778">CVE-2010-3778
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778">CVE-2010-3778
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508">CVE-2010-4508
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508">CVE-2010-4508
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074">CVE-2010-5074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074">CVE-2010-5074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051">CVE-2011-0051
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051">CVE-2011-0051
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053">CVE-2011-0053
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053">CVE-2011-0053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054">CVE-2011-0054
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054">CVE-2011-0054
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055">CVE-2011-0055
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055">CVE-2011-0055
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056">CVE-2011-0056
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056">CVE-2011-0056
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057">CVE-2011-0057
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057">CVE-2011-0057
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058">CVE-2011-0058
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058">CVE-2011-0058
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059">CVE-2011-0059
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059">CVE-2011-0059
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061">CVE-2011-0061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061">CVE-2011-0061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062">CVE-2011-0062
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062">CVE-2011-0062
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065">CVE-2011-0065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065">CVE-2011-0065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066">CVE-2011-0066
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066">CVE-2011-0066
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067">CVE-2011-0067
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067">CVE-2011-0067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068">CVE-2011-0068
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068">CVE-2011-0068
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069">CVE-2011-0069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069">CVE-2011-0069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070">CVE-2011-0070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070">CVE-2011-0070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071">CVE-2011-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071">CVE-2011-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072">CVE-2011-0072
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072">CVE-2011-0072
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073">CVE-2011-0073
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073">CVE-2011-0073
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074">CVE-2011-0074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074">CVE-2011-0074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075">CVE-2011-0075
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075">CVE-2011-0075
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076">CVE-2011-0076
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076">CVE-2011-0076
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077">CVE-2011-0077
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077">CVE-2011-0077
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078">CVE-2011-0078
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078">CVE-2011-0078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079">CVE-2011-0079
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079">CVE-2011-0079
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080">CVE-2011-0080
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080">CVE-2011-0080
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081">CVE-2011-0081
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081">CVE-2011-0081
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082">CVE-2011-0082
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082">CVE-2011-0082
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083">CVE-2011-0083
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083">CVE-2011-0083
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084">CVE-2011-0084
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084">CVE-2011-0084
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085">CVE-2011-0085
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085">CVE-2011-0085
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187">CVE-2011-1187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202">CVE-2011-1202
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187">CVE-2011-1187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202">CVE-2011-1202
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712">CVE-2011-1712
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712">CVE-2011-1712
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362">CVE-2011-2362
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362">CVE-2011-2362
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363">CVE-2011-2363
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363">CVE-2011-2363
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364">CVE-2011-2364
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364">CVE-2011-2364
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365">CVE-2011-2365
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365">CVE-2011-2365
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369">CVE-2011-2369
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369">CVE-2011-2369
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370">CVE-2011-2370
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370">CVE-2011-2370
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371">CVE-2011-2371
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371">CVE-2011-2371
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372">CVE-2011-2372
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372">CVE-2011-2372
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373">CVE-2011-2373
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373">CVE-2011-2373
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374">CVE-2011-2374
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374">CVE-2011-2374
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375">CVE-2011-2375
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375">CVE-2011-2375
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376">CVE-2011-2376
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376">CVE-2011-2376
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377">CVE-2011-2377
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377">CVE-2011-2377
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378">CVE-2011-2378
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378">CVE-2011-2378
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605">CVE-2011-2605
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605">CVE-2011-2605
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980">CVE-2011-2980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980">CVE-2011-2980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981">CVE-2011-2981
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981">CVE-2011-2981
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982">CVE-2011-2982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982">CVE-2011-2982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983">CVE-2011-2983
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983">CVE-2011-2983
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984">CVE-2011-2984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984">CVE-2011-2984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985">CVE-2011-2985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985">CVE-2011-2985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986">CVE-2011-2986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986">CVE-2011-2986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987">CVE-2011-2987
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987">CVE-2011-2987
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988">CVE-2011-2988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988">CVE-2011-2988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989">CVE-2011-2989
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989">CVE-2011-2989
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990">CVE-2011-2990
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990">CVE-2011-2990
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991">CVE-2011-2991
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991">CVE-2011-2991
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993">CVE-2011-2993
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993">CVE-2011-2993
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995">CVE-2011-2995
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995">CVE-2011-2995
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996">CVE-2011-2996
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996">CVE-2011-2996
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997">CVE-2011-2997
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997">CVE-2011-2997
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998">CVE-2011-2998
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998">CVE-2011-2998
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999">CVE-2011-2999
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999">CVE-2011-2999
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000">CVE-2011-3000
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000">CVE-2011-3000
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001">CVE-2011-3001
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001">CVE-2011-3001
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002">CVE-2011-3002
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002">CVE-2011-3002
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003">CVE-2011-3003
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003">CVE-2011-3003
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004">CVE-2011-3004
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004">CVE-2011-3004
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005">CVE-2011-3005
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005">CVE-2011-3005
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062">CVE-2011-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232">CVE-2011-3232
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062">CVE-2011-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232">CVE-2011-3232
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640">CVE-2011-3640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647">CVE-2011-3647
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640">CVE-2011-3640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647">CVE-2011-3647
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648">CVE-2011-3648
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648">CVE-2011-3648
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649">CVE-2011-3649
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649">CVE-2011-3649
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650">CVE-2011-3650
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650">CVE-2011-3650
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651">CVE-2011-3651
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651">CVE-2011-3651
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652">CVE-2011-3652
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652">CVE-2011-3652
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653">CVE-2011-3653
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653">CVE-2011-3653
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654">CVE-2011-3654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654">CVE-2011-3654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655">CVE-2011-3655
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655">CVE-2011-3655
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658">CVE-2011-3658
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658">CVE-2011-3658
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659">CVE-2011-3659
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659">CVE-2011-3659
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660">CVE-2011-3660
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660">CVE-2011-3660
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661">CVE-2011-3661
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661">CVE-2011-3661
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663">CVE-2011-3663
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663">CVE-2011-3663
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665">CVE-2011-3665
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665">CVE-2011-3665
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670">CVE-2011-3670
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670">CVE-2011-3670
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866">CVE-2011-3866
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866">CVE-2011-3866
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688">CVE-2011-4688
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688">CVE-2011-4688
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441">CVE-2012-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442">CVE-2012-0442
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441">CVE-2012-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442">CVE-2012-0442
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443">CVE-2012-0443
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443">CVE-2012-0443
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444">CVE-2012-0444
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444">CVE-2012-0444
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445">CVE-2012-0445
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445">CVE-2012-0445
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446">CVE-2012-0446
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446">CVE-2012-0446
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447">CVE-2012-0447
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447">CVE-2012-0447
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449">CVE-2012-0449
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449">CVE-2012-0449
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450">CVE-2012-0450
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450">CVE-2012-0450
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451">CVE-2012-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452">CVE-2012-0452
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451">CVE-2012-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452">CVE-2012-0452
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455">CVE-2012-0455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456">CVE-2012-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457">CVE-2012-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458">CVE-2012-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459">CVE-2012-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460">CVE-2012-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461">CVE-2012-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462">CVE-2012-0462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463">CVE-2012-0463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464">CVE-2012-0464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467">CVE-2012-0467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468">CVE-2012-0468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469">CVE-2012-0469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470">CVE-2012-0470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471">CVE-2012-0471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473">CVE-2012-0473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474">CVE-2012-0474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475">CVE-2012-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477">CVE-2012-0477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478">CVE-2012-0478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479">CVE-2012-0479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937">CVE-2012-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938">CVE-2012-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939">CVE-2012-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940">CVE-2012-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941">CVE-2012-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945">CVE-2012-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946">CVE-2012-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947">CVE-2012-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948">CVE-2012-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949">CVE-2012-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950">CVE-2012-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951">CVE-2012-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952">CVE-2012-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953">CVE-2012-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954">CVE-2012-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955">CVE-2012-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956">CVE-2012-1956
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455">CVE-2012-0455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456">CVE-2012-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457">CVE-2012-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458">CVE-2012-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459">CVE-2012-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460">CVE-2012-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461">CVE-2012-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462">CVE-2012-0462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463">CVE-2012-0463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464">CVE-2012-0464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467">CVE-2012-0467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468">CVE-2012-0468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469">CVE-2012-0469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470">CVE-2012-0470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471">CVE-2012-0471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473">CVE-2012-0473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474">CVE-2012-0474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475">CVE-2012-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477">CVE-2012-0477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478">CVE-2012-0478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479">CVE-2012-0479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937">CVE-2012-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938">CVE-2012-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939">CVE-2012-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940">CVE-2012-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941">CVE-2012-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945">CVE-2012-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946">CVE-2012-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947">CVE-2012-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948">CVE-2012-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949">CVE-2012-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950">CVE-2012-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951">CVE-2012-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952">CVE-2012-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953">CVE-2012-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954">CVE-2012-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955">CVE-2012-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956">CVE-2012-1956
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957">CVE-2012-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958">CVE-2012-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959">CVE-2012-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960">CVE-2012-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961">CVE-2012-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962">CVE-2012-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963">CVE-2012-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964">CVE-2012-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965">CVE-2012-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966">CVE-2012-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967">CVE-2012-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970">CVE-2012-1970
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957">CVE-2012-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958">CVE-2012-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959">CVE-2012-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960">CVE-2012-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961">CVE-2012-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962">CVE-2012-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963">CVE-2012-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964">CVE-2012-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965">CVE-2012-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966">CVE-2012-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967">CVE-2012-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970">CVE-2012-1970
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971">CVE-2012-1971
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971">CVE-2012-1971
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972">CVE-2012-1972
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972">CVE-2012-1972
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973">CVE-2012-1973
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973">CVE-2012-1973
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974">CVE-2012-1974
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974">CVE-2012-1974
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975">CVE-2012-1975
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975">CVE-2012-1975
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976">CVE-2012-1976
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976">CVE-2012-1976
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994">CVE-2012-1994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956">CVE-2012-3956
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994">CVE-2012-1994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956">CVE-2012-3956
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957">CVE-2012-3957
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957">CVE-2012-3957
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958">CVE-2012-3958
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958">CVE-2012-3958
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959">CVE-2012-3959
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959">CVE-2012-3959
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960">CVE-2012-3960
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960">CVE-2012-3960
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961">CVE-2012-3961
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961">CVE-2012-3961
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962">CVE-2012-3962
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962">CVE-2012-3962
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963">CVE-2012-3963
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963">CVE-2012-3963
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964">CVE-2012-3964
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964">CVE-2012-3964
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965">CVE-2012-3965
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965">CVE-2012-3965
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966">CVE-2012-3966
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966">CVE-2012-3966
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967">CVE-2012-3967
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967">CVE-2012-3967
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968">CVE-2012-3968
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968">CVE-2012-3968
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969">CVE-2012-3969
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969">CVE-2012-3969
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970">CVE-2012-3970
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970">CVE-2012-3970
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971">CVE-2012-3971
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971">CVE-2012-3971
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972">CVE-2012-3972
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972">CVE-2012-3972
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973">CVE-2012-3973
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973">CVE-2012-3973
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975">CVE-2012-3975
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975">CVE-2012-3975
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976">CVE-2012-3976
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976">CVE-2012-3976
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977">CVE-2012-3977
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977">CVE-2012-3977
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978">CVE-2012-3978
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978">CVE-2012-3978
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980">CVE-2012-3980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980">CVE-2012-3980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982">CVE-2012-3982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982">CVE-2012-3982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984">CVE-2012-3984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984">CVE-2012-3984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985">CVE-2012-3985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985">CVE-2012-3985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986">CVE-2012-3986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986">CVE-2012-3986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988">CVE-2012-3988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988">CVE-2012-3988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989">CVE-2012-3989
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989">CVE-2012-3989
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990">CVE-2012-3990
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990">CVE-2012-3990
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991">CVE-2012-3991
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991">CVE-2012-3991
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992">CVE-2012-3992
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992">CVE-2012-3992
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993">CVE-2012-3993
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993">CVE-2012-3993
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994">CVE-2012-3994
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994">CVE-2012-3994
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995">CVE-2012-3995
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995">CVE-2012-3995
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179">CVE-2012-4179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179">CVE-2012-4179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180">CVE-2012-4180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180">CVE-2012-4180
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181">CVE-2012-4181
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181">CVE-2012-4181
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182">CVE-2012-4182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182">CVE-2012-4182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183">CVE-2012-4183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183">CVE-2012-4183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184">CVE-2012-4184
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184">CVE-2012-4184
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185">CVE-2012-4185
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185">CVE-2012-4185
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186">CVE-2012-4186
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186">CVE-2012-4186
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187">CVE-2012-4187
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187">CVE-2012-4187
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188">CVE-2012-4188
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188">CVE-2012-4188
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190">CVE-2012-4190
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190">CVE-2012-4190
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191">CVE-2012-4191
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191">CVE-2012-4191
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192">CVE-2012-4192
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192">CVE-2012-4192
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193">CVE-2012-4193
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193">CVE-2012-4193
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194">CVE-2012-4194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195">CVE-2012-4195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196">CVE-2012-4196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201">CVE-2012-4201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202">CVE-2012-4202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204">CVE-2012-4204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205">CVE-2012-4205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206">CVE-2012-4206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207">CVE-2012-4207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208">CVE-2012-4208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209">CVE-2012-4209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210">CVE-2012-4210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212">CVE-2012-4212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215">CVE-2012-4215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216">CVE-2012-4216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354">CVE-2012-5354
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194">CVE-2012-4194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195">CVE-2012-4195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196">CVE-2012-4196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201">CVE-2012-4201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202">CVE-2012-4202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204">CVE-2012-4204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205">CVE-2012-4205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206">CVE-2012-4206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207">CVE-2012-4207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208">CVE-2012-4208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209">CVE-2012-4209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210">CVE-2012-4210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212">CVE-2012-4212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215">CVE-2012-4215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216">CVE-2012-4216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354">CVE-2012-5354
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829">CVE-2012-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830">CVE-2012-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833">CVE-2012-5833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835">CVE-2012-5835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836">CVE-2012-5836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838">CVE-2012-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839">CVE-2012-5839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840">CVE-2012-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841">CVE-2012-5841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842">CVE-2012-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843">CVE-2012-5843</uri>
- <uri link="http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-certificates/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829">CVE-2012-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830">CVE-2012-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833">CVE-2012-5833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835">CVE-2012-5835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836">CVE-2012-5836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838">CVE-2012-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839">CVE-2012-5839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840">CVE-2012-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841">CVE-2012-5841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842">CVE-2012-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843">CVE-2012-5843</uri>
+ <uri link="https://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-certificates/">
Firefox Blocking Fraudulent Certificates
</uri>
- <uri link="http://www.mozilla.org/security/announce/2011/mfsa2011-11.html">
+ <uri link="https://www.mozilla.org/security/announce/2011/mfsa2011-11.html">
Mozilla Foundation Security Advisory 2011-11
</uri>
- <uri link="http://www.mozilla.org/security/announce/2011/mfsa2011-34.html">
+ <uri link="https://www.mozilla.org/security/announce/2011/mfsa2011-34.html">
Mozilla Foundation Security Advisory 2011-34
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 00:21:02 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T00:21:02Z">craig</metadata>
</glsa>
diff --git a/glsa-201301-02.xml b/glsa-201301-02.xml
index f0b93a82..e0e83b44 100644
--- a/glsa-201301-02.xml
+++ b/glsa-201301-02.xml
@@ -4,8 +4,8 @@
<title>HAProxy: Arbitrary code execution</title>
<synopsis>A buffer overflow in HAProxy may allow execution of arbitrary code.</synopsis>
<product type="ebuild">haproxy</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>417079</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2942">CVE-2012-2942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2942">CVE-2012-2942</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Jun 2012 15:38:17 +0000">
+ <metadata tag="requester" timestamp="2012-06-10T15:38:17Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 23:51:14 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T23:51:14Z">ackle</metadata>
</glsa>
diff --git a/glsa-201301-03.xml b/glsa-201301-03.xml
index 480d5d7e..84d3ca68 100644
--- a/glsa-201301-03.xml
+++ b/glsa-201301-03.xml
@@ -6,8 +6,8 @@
to cause Denial of Service or obtain sensitive information.
</synopsis>
<product type="ebuild">tor</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>432188</bug>
<bug>434882</bug>
<bug>444804</bug>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517">CVE-2012-3517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518">CVE-2012-3518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519">CVE-2012-3519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419">CVE-2012-4419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922">CVE-2012-4922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573">CVE-2012-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517">CVE-2012-3517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518">CVE-2012-3518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519">CVE-2012-3519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419">CVE-2012-4419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922">CVE-2012-4922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573">CVE-2012-5573</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Sep 2012 10:40:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 23:51:55 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-19T10:40:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T23:51:55Z">ackle</metadata>
</glsa>
diff --git a/glsa-201301-04.xml b/glsa-201301-04.xml
index b3d0c17d..5b30e74c 100644
--- a/glsa-201301-04.xml
+++ b/glsa-201301-04.xml
@@ -6,8 +6,8 @@
to execute arbitrary code on the DHCP client.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>362459</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0996">CVE-2011-0996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0996">CVE-2011-0996</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:25 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:39:13 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:39:13Z">craig</metadata>
</glsa>
diff --git a/glsa-201301-05.xml b/glsa-201301-05.xml
index d2daa5c4..069aeebe 100644
--- a/glsa-201301-05.xml
+++ b/glsa-201301-05.xml
@@ -6,8 +6,8 @@
result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">bzip2</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>338215</bug>
<access>local</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:01 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:39:55 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:01Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:39:55Z">craig</metadata>
</glsa>
diff --git a/glsa-201301-06.xml b/glsa-201301-06.xml
index 41f56f82..6b89301f 100644
--- a/glsa-201301-06.xml
+++ b/glsa-201301-06.xml
@@ -6,8 +6,8 @@
which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">ISC DHCP Server</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>362453</bug>
<bug>378799</bug>
<bug>393617</bug>
@@ -46,18 +46,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997">CVE-2011-0997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748">CVE-2011-2748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749">CVE-2011-2749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539">CVE-2011-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868">CVE-2011-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570">CVE-2012-3570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571">CVE-2012-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954">CVE-2012-3954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955">CVE-2012-3955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997">CVE-2011-0997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748">CVE-2011-2748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749">CVE-2011-2749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539">CVE-2011-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868">CVE-2011-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570">CVE-2012-3570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571">CVE-2012-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954">CVE-2012-3954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955">CVE-2012-3955</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2011 16:33:23 +0000">
+ <metadata tag="requester" timestamp="2011-10-11T16:33:23Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:42:17 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:42:17Z">craig</metadata>
</glsa>
diff --git a/glsa-201301-07.xml b/glsa-201301-07.xml
index d0c0b380..63e4c454 100644
--- a/glsa-201301-07.xml
+++ b/glsa-201301-07.xml
@@ -6,8 +6,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">DokuWiki</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>301310</bug>
<bug>386155</bug>
<bug>412891</bug>
@@ -47,15 +47,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0287">CVE-2010-0287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0288">CVE-2010-0288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0289">CVE-2010-0289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2510">CVE-2011-2510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3727">CVE-2011-3727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0283">CVE-2012-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0287">CVE-2010-0287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0288">CVE-2010-0288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0289">CVE-2010-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2510">CVE-2011-2510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3727">CVE-2011-3727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0283">CVE-2012-0283</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:15 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:43:00 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:43:00Z">craig</metadata>
</glsa>
diff --git a/glsa-201304-01.xml b/glsa-201304-01.xml
index a0ea597c..e8c77d8b 100644
--- a/glsa-201304-01.xml
+++ b/glsa-201304-01.xml
@@ -6,8 +6,8 @@
gain escalated privileges.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>April 08, 2013</announced>
- <revised>April 08, 2013: 1</revised>
+ <announced>2013-04-08</announced>
+ <revised>2013-04-08: 1</revised>
<bug>429614</bug>
<bug>464248</bug>
<access>remote</access>
@@ -55,9 +55,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4225">CVE-2012-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0131">CVE-2013-0131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4225">CVE-2012-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0131">CVE-2013-0131</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Aug 2012 20:47:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Apr 2013 22:10:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-09T20:47:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-04-08T22:10:10Z">ackle</metadata>
</glsa>
diff --git a/glsa-201307-01.xml b/glsa-201307-01.xml
index b072e1b6..0e922a5b 100644
--- a/glsa-201307-01.xml
+++ b/glsa-201307-01.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">HAProxy</product>
- <announced>July 11, 2013</announced>
- <revised>July 11, 2013: 1</revised>
+ <announced>2013-07-11</announced>
+ <revised>2013-07-11: 1</revised>
<bug>464340</bug>
<bug>473674</bug>
<access>remote</access>
@@ -46,13 +46,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1912">CVE-2013-1912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2175">CVE-2013-2175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1912">CVE-2013-1912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2175">CVE-2013-2175</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Jul 2013 15:13:45 +0000">
+ <metadata tag="requester" timestamp="2013-07-07T15:13:45Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Jul 2013 23:08:33 +0000">
+ <metadata tag="submitter" timestamp="2013-07-11T23:08:33Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201308-01.xml b/glsa-201308-01.xml
index eaa3204c..0f5d830b 100644
--- a/glsa-201308-01.xml
+++ b/glsa-201308-01.xml
@@ -6,8 +6,8 @@
attackers to compromise user system
</synopsis>
<product type="ebuild">putty</product>
- <announced>August 21, 2013</announced>
- <revised>August 21, 2013: 2</revised>
+ <announced>2013-08-21</announced>
+ <revised>2013-08-21: 2</revised>
<bug>394429</bug>
<bug>479872</bug>
<access>local, remote</access>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4607">CVE-2011-4607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4607">CVE-2011-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 21:22:42 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Aug 2013 11:27:53 +0000">
+ <metadata tag="requester" timestamp="2012-03-06T21:22:42Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-21T11:27:53Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201308-02.xml b/glsa-201308-02.xml
index 32f48879..5dc984d3 100644
--- a/glsa-201308-02.xml
+++ b/glsa-201308-02.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service.
</synopsis>
<product type="ebuild">d-bus</product>
- <announced>August 22, 2013</announced>
- <revised>August 22, 2013: 1</revised>
+ <announced>2013-08-22</announced>
+ <revised>2013-08-22: 1</revised>
<bug>473190</bug>
<access>local</access>
<affected>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2168">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2168">
CVE-2013-2168
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jul 2013 01:19:11 +0000">
+ <metadata tag="requester" timestamp="2013-07-12T01:19:11Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Aug 2013 15:34:55 +0000">
+ <metadata tag="submitter" timestamp="2013-08-22T15:34:55Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201308-03.xml b/glsa-201308-03.xml
index c63b10ed..dffb8a97 100644
--- a/glsa-201308-03.xml
+++ b/glsa-201308-03.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">Ebuild</product>
- <announced>August 22, 2013</announced>
- <revised>January 30, 2014: 2</revised>
+ <announced>2013-08-22</announced>
+ <revised>2014-01-30: 2</revised>
<bug>431732</bug>
<bug>451058</bug>
<bug>469960</bug>
@@ -47,84 +47,84 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525">CVE-2012-1525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530">CVE-2012-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049">CVE-2012-2049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050">CVE-2012-2050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051">CVE-2012-2051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147">CVE-2012-4147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4148">CVE-2012-4148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149">CVE-2012-4149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150">CVE-2012-4150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151">CVE-2012-4151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152">CVE-2012-4152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153">CVE-2012-4153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154">CVE-2012-4154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155">CVE-2012-4155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156">CVE-2012-4156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157">CVE-2012-4157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158">CVE-2012-4158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159">CVE-2012-4159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160">CVE-2012-4160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363">CVE-2012-4363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601">CVE-2013-0601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602">CVE-2013-0602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603">CVE-2013-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604">CVE-2013-0604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605">CVE-2013-0605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606">CVE-2013-0606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607">CVE-2013-0607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608">CVE-2013-0608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609">CVE-2013-0609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610">CVE-2013-0610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611">CVE-2013-0611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612">CVE-2013-0612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613">CVE-2013-0613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614">CVE-2013-0614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615">CVE-2013-0615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616">CVE-2013-0616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617">CVE-2013-0617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618">CVE-2013-0618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619">CVE-2013-0619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620">CVE-2013-0620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621">CVE-2013-0621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622">CVE-2013-0622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623">CVE-2013-0623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624">CVE-2013-0624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626">CVE-2013-0626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627">CVE-2013-0627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640">CVE-2013-0640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641">CVE-2013-0641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549">CVE-2013-2549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550">CVE-2013-2550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718">CVE-2013-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719">CVE-2013-2719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720">CVE-2013-2720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721">CVE-2013-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722">CVE-2013-2722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723">CVE-2013-2723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724">CVE-2013-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725">CVE-2013-2725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726">CVE-2013-2726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727">CVE-2013-2727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729">CVE-2013-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730">CVE-2013-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731">CVE-2013-2731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732">CVE-2013-2732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733">CVE-2013-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734">CVE-2013-2734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735">CVE-2013-2735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736">CVE-2013-2736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737">CVE-2013-2737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337">CVE-2013-3337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338">CVE-2013-3338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339">CVE-2013-3339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340">CVE-2013-3340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341">CVE-2013-3341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342">CVE-2013-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525">CVE-2012-1525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530">CVE-2012-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049">CVE-2012-2049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050">CVE-2012-2050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051">CVE-2012-2051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147">CVE-2012-4147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4148">CVE-2012-4148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149">CVE-2012-4149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150">CVE-2012-4150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151">CVE-2012-4151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152">CVE-2012-4152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153">CVE-2012-4153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154">CVE-2012-4154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155">CVE-2012-4155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156">CVE-2012-4156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157">CVE-2012-4157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158">CVE-2012-4158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159">CVE-2012-4159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160">CVE-2012-4160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363">CVE-2012-4363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601">CVE-2013-0601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602">CVE-2013-0602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603">CVE-2013-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604">CVE-2013-0604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605">CVE-2013-0605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606">CVE-2013-0606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607">CVE-2013-0607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608">CVE-2013-0608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609">CVE-2013-0609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610">CVE-2013-0610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611">CVE-2013-0611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612">CVE-2013-0612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613">CVE-2013-0613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614">CVE-2013-0614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615">CVE-2013-0615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616">CVE-2013-0616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617">CVE-2013-0617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618">CVE-2013-0618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619">CVE-2013-0619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620">CVE-2013-0620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621">CVE-2013-0621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622">CVE-2013-0622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623">CVE-2013-0623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624">CVE-2013-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626">CVE-2013-0626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627">CVE-2013-0627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640">CVE-2013-0640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641">CVE-2013-0641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549">CVE-2013-2549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550">CVE-2013-2550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718">CVE-2013-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719">CVE-2013-2719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720">CVE-2013-2720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721">CVE-2013-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722">CVE-2013-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723">CVE-2013-2723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724">CVE-2013-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725">CVE-2013-2725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726">CVE-2013-2726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727">CVE-2013-2727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729">CVE-2013-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730">CVE-2013-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731">CVE-2013-2731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732">CVE-2013-2732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733">CVE-2013-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734">CVE-2013-2734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735">CVE-2013-2735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736">CVE-2013-2736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737">CVE-2013-2737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337">CVE-2013-3337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338">CVE-2013-3338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339">CVE-2013-3339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340">CVE-2013-3340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341">CVE-2013-3341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342">CVE-2013-3342</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Mar 2013 23:42:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Jan 2014 07:45:58 +0000">
+ <metadata tag="requester" timestamp="2013-03-04T23:42:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-30T07:45:58Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201308-04.xml b/glsa-201308-04.xml
index 8da001b0..ce5601ed 100644
--- a/glsa-201308-04.xml
+++ b/glsa-201308-04.xml
@@ -6,8 +6,8 @@
which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">puppet</product>
- <announced>August 23, 2013</announced>
- <revised>August 23, 2013: 1</revised>
+ <announced>2013-08-23</announced>
+ <revised>2013-08-23: 1</revised>
<bug>456002</bug>
<bug>461656</bug>
<bug>473720</bug>
@@ -45,18 +45,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6120">CVE-2012-6120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1640">CVE-2013-1640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1652">CVE-2013-1652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1653">CVE-2013-1653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1654">CVE-2013-1654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1655">CVE-2013-1655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2274">CVE-2013-2274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2275">CVE-2013-2275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3567">CVE-2013-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4761">CVE-2013-4761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4956">CVE-2013-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6120">CVE-2012-6120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1640">CVE-2013-1640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1652">CVE-2013-1652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1653">CVE-2013-1653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1654">CVE-2013-1654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1655">CVE-2013-1655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2274">CVE-2013-2274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2275">CVE-2013-2275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3567">CVE-2013-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4761">CVE-2013-4761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4956">CVE-2013-4956</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 21:39:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 23 Aug 2013 18:13:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T21:39:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-23T18:13:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201308-05.xml b/glsa-201308-05.xml
index c63c9085..a83e5171 100644
--- a/glsa-201308-05.xml
+++ b/glsa-201308-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 28, 2013</announced>
- <revised>August 30, 2013: 2</revised>
+ <announced>2013-08-28</announced>
+ <revised>2013-08-30: 2</revised>
<bug>398549</bug>
<bug>427964</bug>
<bug>431572</bug>
@@ -55,67 +55,67 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041">CVE-2012-0041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042">CVE-2012-0042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043">CVE-2012-0043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066">CVE-2012-0066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067">CVE-2012-0067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068">CVE-2012-0068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548">CVE-2012-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048">CVE-2012-4048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049">CVE-2012-4049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285">CVE-2012-4285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286">CVE-2012-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287">CVE-2012-4287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288">CVE-2012-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289">CVE-2012-4289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290">CVE-2012-4290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291">CVE-2012-4291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292">CVE-2012-4292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293">CVE-2012-4293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294">CVE-2012-4294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295">CVE-2012-4295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296">CVE-2012-4296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297">CVE-2012-4297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298">CVE-2012-4298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555">CVE-2013-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556">CVE-2013-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557">CVE-2013-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558">CVE-2013-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559">CVE-2013-3559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3560">CVE-2013-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3561">CVE-2013-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3562">CVE-2013-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074">CVE-2013-4074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075">CVE-2013-4075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076">CVE-2013-4076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077">CVE-2013-4077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078">CVE-2013-4078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079">CVE-2013-4079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080">CVE-2013-4080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081">CVE-2013-4081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082">CVE-2013-4082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083">CVE-2013-4083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920">CVE-2013-4920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921">CVE-2013-4921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922">CVE-2013-4922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923">CVE-2013-4923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924">CVE-2013-4924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925">CVE-2013-4925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926">CVE-2013-4926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927">CVE-2013-4927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928">CVE-2013-4928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929">CVE-2013-4929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930">CVE-2013-4930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931">CVE-2013-4931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932">CVE-2013-4932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933">CVE-2013-4933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934">CVE-2013-4934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935">CVE-2013-4935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936">CVE-2013-4936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041">CVE-2012-0041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042">CVE-2012-0042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043">CVE-2012-0043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066">CVE-2012-0066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067">CVE-2012-0067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068">CVE-2012-0068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548">CVE-2012-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048">CVE-2012-4048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049">CVE-2012-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285">CVE-2012-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286">CVE-2012-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287">CVE-2012-4287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288">CVE-2012-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289">CVE-2012-4289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290">CVE-2012-4290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291">CVE-2012-4291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292">CVE-2012-4292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293">CVE-2012-4293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294">CVE-2012-4294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295">CVE-2012-4295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296">CVE-2012-4296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297">CVE-2012-4297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298">CVE-2012-4298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555">CVE-2013-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556">CVE-2013-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557">CVE-2013-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558">CVE-2013-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559">CVE-2013-3559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3560">CVE-2013-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3561">CVE-2013-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3562">CVE-2013-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074">CVE-2013-4074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075">CVE-2013-4075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076">CVE-2013-4076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077">CVE-2013-4077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078">CVE-2013-4078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079">CVE-2013-4079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080">CVE-2013-4080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081">CVE-2013-4081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082">CVE-2013-4082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083">CVE-2013-4083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920">CVE-2013-4920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921">CVE-2013-4921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922">CVE-2013-4922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923">CVE-2013-4923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924">CVE-2013-4924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925">CVE-2013-4925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926">CVE-2013-4926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927">CVE-2013-4927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928">CVE-2013-4928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929">CVE-2013-4929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930">CVE-2013-4930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931">CVE-2013-4931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932">CVE-2013-4932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933">CVE-2013-4933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934">CVE-2013-4934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935">CVE-2013-4935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936">CVE-2013-4936</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 May 2012 22:02:05 +0000">
+ <metadata tag="requester" timestamp="2012-05-10T22:02:05Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Aug 2013 07:20:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-30T07:20:47Z">ackle</metadata>
</glsa>
diff --git a/glsa-201308-06.xml b/glsa-201308-06.xml
index c8ce0ba9..d9236a70 100644
--- a/glsa-201308-06.xml
+++ b/glsa-201308-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 29, 2013</announced>
- <revised>August 30, 2013: 2</revised>
+ <announced>2013-08-29</announced>
+ <revised>2013-08-30: 2</revised>
<bug>399375</bug>
<bug>411503</bug>
<bug>412889</bug>
@@ -50,112 +50,112 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2262">CVE-2011-2262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0075">CVE-2012-0075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0087">CVE-2012-0087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0101">CVE-2012-0101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0102">CVE-2012-0102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0112">CVE-2012-0112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0113">CVE-2012-0113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0114">CVE-2012-0114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0115">CVE-2012-0115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0116">CVE-2012-0116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0117">CVE-2012-0117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0118">CVE-2012-0118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0119">CVE-2012-0119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0120">CVE-2012-0120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0484">CVE-2012-0484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0485">CVE-2012-0485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0486">CVE-2012-0486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0487">CVE-2012-0487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0488">CVE-2012-0488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0489">CVE-2012-0489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0490">CVE-2012-0490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0491">CVE-2012-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0492">CVE-2012-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0493">CVE-2012-0493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0494">CVE-2012-0494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0495">CVE-2012-0495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0496">CVE-2012-0496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0540">CVE-2012-0540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0553">CVE-2012-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0572">CVE-2012-0572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0574">CVE-2012-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0578">CVE-2012-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0583">CVE-2012-0583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1688">CVE-2012-1688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1689">CVE-2012-1689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1690">CVE-2012-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1696">CVE-2012-1696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1697">CVE-2012-1697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1702">CVE-2012-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1703">CVE-2012-1703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1705">CVE-2012-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1734">CVE-2012-1734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2102">CVE-2012-2102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2122">CVE-2012-2122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2749">CVE-2012-2749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3150">CVE-2012-3150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3158">CVE-2012-3158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3160">CVE-2012-3160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3163">CVE-2012-3163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3166">CVE-2012-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3167">CVE-2012-3167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3173">CVE-2012-3173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3177">CVE-2012-3177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3180">CVE-2012-3180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3197">CVE-2012-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5060">CVE-2012-5060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5096">CVE-2012-5096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5611">CVE-2012-5611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5612">CVE-2012-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5613">CVE-2012-5613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5614">CVE-2012-5614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5615">CVE-2012-5615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5627">CVE-2012-5627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0367">CVE-2013-0367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0368">CVE-2013-0368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0371">CVE-2013-0371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0375">CVE-2013-0375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0383">CVE-2013-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0384">CVE-2013-0384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0385">CVE-2013-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0386">CVE-2013-0386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0389">CVE-2013-0389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1492">CVE-2013-1492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1502">CVE-2013-1502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1506">CVE-2013-1506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1511">CVE-2013-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1512">CVE-2013-1512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1521">CVE-2013-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1523">CVE-2013-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1526">CVE-2013-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1531">CVE-2013-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1532">CVE-2013-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1544">CVE-2013-1544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1548">CVE-2013-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1552">CVE-2013-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1555">CVE-2013-1555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1566">CVE-2013-1566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1567">CVE-2013-1567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1570">CVE-2013-1570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1623">CVE-2013-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2375">CVE-2013-2375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2376">CVE-2013-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2378">CVE-2013-2378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2381">CVE-2013-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2389">CVE-2013-2389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2391">CVE-2013-2391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2392">CVE-2013-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2395">CVE-2013-2395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3802">CVE-2013-3802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3804">CVE-2013-3804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3808">CVE-2013-3808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2262">CVE-2011-2262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0075">CVE-2012-0075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0087">CVE-2012-0087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0101">CVE-2012-0101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0102">CVE-2012-0102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0112">CVE-2012-0112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0113">CVE-2012-0113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0114">CVE-2012-0114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0115">CVE-2012-0115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0116">CVE-2012-0116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0117">CVE-2012-0117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0118">CVE-2012-0118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0119">CVE-2012-0119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0120">CVE-2012-0120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0484">CVE-2012-0484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0485">CVE-2012-0485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0486">CVE-2012-0486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0487">CVE-2012-0487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0488">CVE-2012-0488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0489">CVE-2012-0489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0490">CVE-2012-0490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0491">CVE-2012-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0492">CVE-2012-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0493">CVE-2012-0493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0494">CVE-2012-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0495">CVE-2012-0495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0496">CVE-2012-0496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0540">CVE-2012-0540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0553">CVE-2012-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0572">CVE-2012-0572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0574">CVE-2012-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0578">CVE-2012-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0583">CVE-2012-0583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1688">CVE-2012-1688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1689">CVE-2012-1689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1690">CVE-2012-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1696">CVE-2012-1696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1697">CVE-2012-1697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1702">CVE-2012-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1703">CVE-2012-1703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1705">CVE-2012-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1734">CVE-2012-1734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2102">CVE-2012-2102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2122">CVE-2012-2122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2749">CVE-2012-2749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3150">CVE-2012-3150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3158">CVE-2012-3158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3160">CVE-2012-3160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3163">CVE-2012-3163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3166">CVE-2012-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3167">CVE-2012-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3173">CVE-2012-3173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3177">CVE-2012-3177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3180">CVE-2012-3180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3197">CVE-2012-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5060">CVE-2012-5060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5096">CVE-2012-5096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5611">CVE-2012-5611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5612">CVE-2012-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5613">CVE-2012-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5614">CVE-2012-5614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5615">CVE-2012-5615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5627">CVE-2012-5627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0367">CVE-2013-0367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0368">CVE-2013-0368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0371">CVE-2013-0371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0375">CVE-2013-0375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0383">CVE-2013-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0384">CVE-2013-0384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0385">CVE-2013-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0386">CVE-2013-0386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0389">CVE-2013-0389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1492">CVE-2013-1492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1502">CVE-2013-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1506">CVE-2013-1506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1511">CVE-2013-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1512">CVE-2013-1512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1521">CVE-2013-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1523">CVE-2013-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1526">CVE-2013-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1531">CVE-2013-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1532">CVE-2013-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1544">CVE-2013-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1548">CVE-2013-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1552">CVE-2013-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1555">CVE-2013-1555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1566">CVE-2013-1566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1567">CVE-2013-1567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1570">CVE-2013-1570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1623">CVE-2013-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2375">CVE-2013-2375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2376">CVE-2013-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2378">CVE-2013-2378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2381">CVE-2013-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2389">CVE-2013-2389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2391">CVE-2013-2391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2392">CVE-2013-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2395">CVE-2013-2395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3802">CVE-2013-3802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3804">CVE-2013-3804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3808">CVE-2013-3808</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Mar 2012 20:07:11 +0000">
+ <metadata tag="requester" timestamp="2012-03-03T20:07:11Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Aug 2013 07:20:44 +0000">
+ <metadata tag="submitter" timestamp="2013-08-30T07:20:44Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201309-01.xml b/glsa-201309-01.xml
index d1c62750..0f9788c7 100644
--- a/glsa-201309-01.xml
+++ b/glsa-201309-01.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>September 01, 2013</announced>
- <revised>September 01, 2013: 1</revised>
+ <announced>2013-09-01</announced>
+ <revised>2013-09-01: 1</revised>
<bug>476764</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4122">CVE-2013-4122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4122">CVE-2013-4122</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:52:45 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:52:45Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Sep 2013 19:36:23 +0000">
+ <metadata tag="submitter" timestamp="2013-09-01T19:36:23Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-02.xml b/glsa-201309-02.xml
index fcb81b9a..db94be7c 100644
--- a/glsa-201309-02.xml
+++ b/glsa-201309-02.xml
@@ -7,8 +7,8 @@
of Service condition.
</synopsis>
<product type="ebuild">strongswan</product>
- <announced>September 01, 2013</announced>
- <revised>September 01, 2013: 1</revised>
+ <announced>2013-09-01</announced>
+ <revised>2013-09-01: 1</revised>
<bug>468504</bug>
<bug>479396</bug>
<bug>483202</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054">CVE-2013-2054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2944">CVE-2013-2944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5018">CVE-2013-5018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054">CVE-2013-2054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2944">CVE-2013-2944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5018">CVE-2013-5018</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 13:39:48 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T13:39:48Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Sep 2013 23:59:13 +0000">
+ <metadata tag="submitter" timestamp="2013-09-01T23:59:13Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-03.xml b/glsa-201309-03.xml
index 4a838a0a..a765efbe 100644
--- a/glsa-201309-03.xml
+++ b/glsa-201309-03.xml
@@ -6,8 +6,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">Xlockmore</product>
- <announced>September 02, 2013</announced>
- <revised>September 02, 2013: 1</revised>
+ <announced>2013-09-02</announced>
+ <revised>2013-09-02: 1</revised>
<bug>255229</bug>
<bug>440776</bug>
<bug>477328</bug>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4524">CVE-2012-4524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4143">CVE-2013-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4524">CVE-2012-4524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4143">CVE-2013-4143</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 22:04:18 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Sep 2013 09:00:54 +0000">
+ <metadata tag="requester" timestamp="2012-12-16T22:04:18Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-02T09:00:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201309-04.xml b/glsa-201309-04.xml
index cdc1f281..76c9e971 100644
--- a/glsa-201309-04.xml
+++ b/glsa-201309-04.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">snack</product>
- <announced>September 11, 2013</announced>
- <revised>September 11, 2013: 1</revised>
+ <announced>2013-09-11</announced>
+ <revised>2013-09-11: 1</revised>
<bug>446822</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6303">CVE-2012-6303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6303">CVE-2012-6303</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Mar 2013 11:40:00 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Sep 2013 10:07:54 +0000">
+ <metadata tag="requester" timestamp="2013-03-16T11:40:00Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-11T10:07:54Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-05.xml b/glsa-201309-05.xml
index c8e72bf0..69b0be44 100644
--- a/glsa-201309-05.xml
+++ b/glsa-201309-05.xml
@@ -7,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">pip</product>
- <announced>September 12, 2013</announced>
- <revised>September 12, 2013: 1</revised>
+ <announced>2013-09-12</announced>
+ <revised>2013-09-12: 1</revised>
<bug>462616</bug>
<bug>480202</bug>
<access>local, remote</access>
@@ -46,13 +46,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1629">CVE-2013-1629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1888">CVE-2013-1888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1629">CVE-2013-1629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1888">CVE-2013-1888</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Jul 2013 20:41:57 +0000">
+ <metadata tag="requester" timestamp="2013-07-11T20:41:57Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Sep 2013 20:57:59 +0000">
+ <metadata tag="submitter" timestamp="2013-09-12T20:57:59Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-06.xml b/glsa-201309-06.xml
index 6cece4a2..93b8abef 100644
--- a/glsa-201309-06.xml
+++ b/glsa-201309-06.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 14, 2013</announced>
- <revised>September 14, 2013: 2</revised>
+ <announced>2013-09-14</announced>
+ <revised>2013-09-14: 2</revised>
<bug>437808</bug>
<bug>442084</bug>
<bug>446984</bug>
@@ -58,82 +58,82 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5248">CVE-2012-5248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5249">CVE-2012-5249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5250">CVE-2012-5250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5251">CVE-2012-5251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5252">CVE-2012-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5253">CVE-2012-5253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5254">CVE-2012-5254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5255">CVE-2012-5255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5256">CVE-2012-5256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5257">CVE-2012-5257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5258">CVE-2012-5258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5259">CVE-2012-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5260">CVE-2012-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5261">CVE-2012-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5262">CVE-2012-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5263">CVE-2012-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5264">CVE-2012-5264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5265">CVE-2012-5265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5266">CVE-2012-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5267">CVE-2012-5267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5268">CVE-2012-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5269">CVE-2012-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5270">CVE-2012-5270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5271">CVE-2012-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5272">CVE-2012-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5274">CVE-2012-5274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5275">CVE-2012-5275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5276">CVE-2012-5276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5277">CVE-2012-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5278">CVE-2012-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5279">CVE-2012-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5280">CVE-2012-5280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5676">CVE-2012-5676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5677">CVE-2012-5677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5678">CVE-2012-5678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0504">CVE-2013-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0630">CVE-2013-0630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0633">CVE-2013-0633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0634">CVE-2013-0634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0637">CVE-2013-0637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0638">CVE-2013-0638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0639">CVE-2013-0639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0642">CVE-2013-0642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0643">CVE-2013-0643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0644">CVE-2013-0644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0645">CVE-2013-0645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0646">CVE-2013-0646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0647">CVE-2013-0647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0648">CVE-2013-0648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0649">CVE-2013-0649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0650">CVE-2013-0650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1365">CVE-2013-1365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1366">CVE-2013-1366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1367">CVE-2013-1367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1368">CVE-2013-1368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1369">CVE-2013-1369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1370">CVE-2013-1370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1371">CVE-2013-1371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1372">CVE-2013-1372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1373">CVE-2013-1373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1374">CVE-2013-1374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1375">CVE-2013-1375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1378">CVE-2013-1378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1379">CVE-2013-1379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1380">CVE-2013-1380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2555">CVE-2013-2555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2728">CVE-2013-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3343">CVE-2013-3343</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3344">CVE-2013-3344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3345">CVE-2013-3345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3347">CVE-2013-3347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3361">CVE-2013-3361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3362">CVE-2013-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3363">CVE-2013-3363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5324">CVE-2013-5324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5248">CVE-2012-5248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5249">CVE-2012-5249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5250">CVE-2012-5250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5251">CVE-2012-5251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5252">CVE-2012-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5253">CVE-2012-5253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5254">CVE-2012-5254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5255">CVE-2012-5255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5256">CVE-2012-5256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5257">CVE-2012-5257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5258">CVE-2012-5258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5259">CVE-2012-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5260">CVE-2012-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5261">CVE-2012-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5262">CVE-2012-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5263">CVE-2012-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5264">CVE-2012-5264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5265">CVE-2012-5265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5266">CVE-2012-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5267">CVE-2012-5267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5268">CVE-2012-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5269">CVE-2012-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5270">CVE-2012-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5271">CVE-2012-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5272">CVE-2012-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5274">CVE-2012-5274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5275">CVE-2012-5275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5276">CVE-2012-5276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5277">CVE-2012-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5278">CVE-2012-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5279">CVE-2012-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5280">CVE-2012-5280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5676">CVE-2012-5676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5677">CVE-2012-5677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5678">CVE-2012-5678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0504">CVE-2013-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0630">CVE-2013-0630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0633">CVE-2013-0633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0634">CVE-2013-0634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0637">CVE-2013-0637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0638">CVE-2013-0638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0639">CVE-2013-0639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0642">CVE-2013-0642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0643">CVE-2013-0643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0644">CVE-2013-0644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0645">CVE-2013-0645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0646">CVE-2013-0646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0647">CVE-2013-0647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0648">CVE-2013-0648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0649">CVE-2013-0649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0650">CVE-2013-0650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1365">CVE-2013-1365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1366">CVE-2013-1366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1367">CVE-2013-1367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1368">CVE-2013-1368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1369">CVE-2013-1369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1370">CVE-2013-1370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1371">CVE-2013-1371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1372">CVE-2013-1372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1373">CVE-2013-1373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1374">CVE-2013-1374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1375">CVE-2013-1375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1378">CVE-2013-1378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1379">CVE-2013-1379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1380">CVE-2013-1380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2555">CVE-2013-2555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2728">CVE-2013-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3343">CVE-2013-3343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3344">CVE-2013-3344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3345">CVE-2013-3345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3347">CVE-2013-3347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3361">CVE-2013-3361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3362">CVE-2013-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3363">CVE-2013-3363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5324">CVE-2013-5324</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Oct 2012 11:10:18 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Sep 2013 14:46:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-10-22T11:10:18Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-14T14:46:19Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-07.xml b/glsa-201309-07.xml
index 6138e98f..159353ab 100644
--- a/glsa-201309-07.xml
+++ b/glsa-201309-07.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libotr</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>430486</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3461">CVE-2012-3461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3461">CVE-2012-3461</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 14:50:36 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T14:50:36Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:34:43 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:34:43Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-08.xml b/glsa-201309-08.xml
index 17ace767..3ae2fe9a 100644
--- a/glsa-201309-08.xml
+++ b/glsa-201309-08.xml
@@ -6,8 +6,8 @@
which could result in arbitrary code execution.
</synopsis>
<product type="ebuild">filezilla</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>479880</bug>
<bug>482672</bug>
<access>local, remote</access>
@@ -45,21 +45,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4206">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4206">
CVE-2013-4206
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4207">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4207">
CVE-2013-4207
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4208">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4208">
CVE-2013-4208
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:35:29 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:35:29Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:36:50 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:36:50Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-09.xml b/glsa-201309-09.xml
index 9bb3f40b..c9738415 100644
--- a/glsa-201309-09.xml
+++ b/glsa-201309-09.xml
@@ -6,8 +6,8 @@
the worst of which may lead to arbitrary code execution.
</synopsis>
<product type="ebuild">libraw</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>471694</bug>
<bug>482926</bug>
<access>remote</access>
@@ -56,15 +56,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1438">CVE-2013-1438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1439">CVE-2013-1439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2126">CVE-2013-2126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2127">CVE-2013-2127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1438">CVE-2013-1438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1439">CVE-2013-1439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2126">CVE-2013-2126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2127">CVE-2013-2127</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Aug 2013 06:34:07 +0000">
+ <metadata tag="requester" timestamp="2013-08-21T06:34:07Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:41:15 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:41:15Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-10.xml b/glsa-201309-10.xml
index f04b98ef..8ebbcf2f 100644
--- a/glsa-201309-10.xml
+++ b/glsa-201309-10.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>483210</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3346">CVE-2013-3346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3346">CVE-2013-3346</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Aug 2013 22:47:11 +0000">
+ <metadata tag="requester" timestamp="2013-08-31T22:47:11Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:43:05 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:43:05Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-11.xml b/glsa-201309-11.xml
index b0044629..17358674 100644
--- a/glsa-201309-11.xml
+++ b/glsa-201309-11.xml
@@ -7,8 +7,8 @@
sensitive information.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>September 23, 2013</announced>
- <revised>September 23, 2013: 1</revised>
+ <announced>2013-09-23</announced>
+ <revised>2013-09-23: 1</revised>
<bug>350166</bug>
<bug>356741</bug>
<bug>369065</bug>
@@ -49,25 +49,25 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539">CVE-2010-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644">CVE-2010-4644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715">CVE-2011-0715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752">CVE-2011-1752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783">CVE-2011-1783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921">CVE-2011-1921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845">CVE-2013-1845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846">CVE-2013-1846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847">CVE-2013-1847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849">CVE-2013-1849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884">CVE-2013-1884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968">CVE-2013-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088">CVE-2013-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112">CVE-2013-2112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131">CVE-2013-4131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277">CVE-2013-4277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539">CVE-2010-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644">CVE-2010-4644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715">CVE-2011-0715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752">CVE-2011-1752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783">CVE-2011-1783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921">CVE-2011-1921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845">CVE-2013-1845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846">CVE-2013-1846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847">CVE-2013-1847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849">CVE-2013-1849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884">CVE-2013-1884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968">CVE-2013-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088">CVE-2013-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112">CVE-2013-2112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131">CVE-2013-4131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277">CVE-2013-4277</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:25 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Sep 2013 22:53:51 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-23T22:53:51Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-12.xml b/glsa-201309-12.xml
index 76ef2ffd..6f5b4b52 100644
--- a/glsa-201309-12.xml
+++ b/glsa-201309-12.xml
@@ -7,8 +7,8 @@
a Denial of Service condition or perform man-in-the-middle attacks.
</synopsis>
<product type="ebuild">apache</product>
- <announced>September 23, 2013</announced>
- <revised>September 23, 2013: 1</revised>
+ <announced>2013-09-23</announced>
+ <revised>2013-09-23: 1</revised>
<bug>275645</bug>
<bug>438680</bug>
<bug>466502</bug>
@@ -49,14 +49,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6750">CVE-2007-6750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4929">CVE-2012-4929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1862">CVE-2013-1862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1896">CVE-2013-1896</uri>
- <uri link="http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6750">CVE-2007-6750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4929">CVE-2012-4929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1862">CVE-2013-1862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1896">CVE-2013-1896</uri>
+ <uri link="https://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf">
Compression and Information Leakage of Plaintext
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:03:17 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Sep 2013 23:22:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:03:17Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-23T23:22:02Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-13.xml b/glsa-201309-13.xml
index 2b13c868..dce5c4f3 100644
--- a/glsa-201309-13.xml
+++ b/glsa-201309-13.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libzrtpcpp</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>481228</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2221">CVE-2013-2221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2222">CVE-2013-2222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2223">CVE-2013-2223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2221">CVE-2013-2221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2222">CVE-2013-2222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2223">CVE-2013-2223</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Sep 2013 18:53:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 22:01:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-01T18:53:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T22:01:15Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-14.xml b/glsa-201309-14.xml
index c9503294..035680ad 100644
--- a/glsa-201309-14.xml
+++ b/glsa-201309-14.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>449314</bug>
<access>remote</access>
<affected>
@@ -42,11 +42,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6080">CVE-2012-6080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6081">CVE-2012-6081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6082">CVE-2012-6082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6495">CVE-2012-6495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6080">CVE-2012-6080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6081">CVE-2012-6081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6082">CVE-2012-6082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6495">CVE-2012-6495</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2013 17:22:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 22:32:39 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-06T17:22:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T22:32:39Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-15.xml b/glsa-201309-15.xml
index 69c23efa..874c96c7 100644
--- a/glsa-201309-15.xml
+++ b/glsa-201309-15.xml
@@ -6,8 +6,8 @@
which leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ProFTPD</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>305343</bug>
<bug>343389</bug>
<bug>348998</bug>
@@ -50,17 +50,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3867">CVE-2010-3867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4221">CVE-2010-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4652">CVE-2010-4652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1137">CVE-2011-1137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4130">CVE-2011-4130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6095">CVE-2012-6095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4359">CVE-2013-4359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3867">CVE-2010-3867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4221">CVE-2010-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4652">CVE-2010-4652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1137">CVE-2011-1137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4130">CVE-2011-4130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6095">CVE-2012-6095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4359">CVE-2013-4359</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:05 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:05Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 23:08:08 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T23:08:08Z">craig</metadata>
</glsa>
diff --git a/glsa-201309-16.xml b/glsa-201309-16.xml
index 07b548a9..3529e19e 100644
--- a/glsa-201309-16.xml
+++ b/glsa-201309-16.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>September 24, 2013</announced>
- <revised>September 25, 2013: 2</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-25: 2</revised>
<bug>442096</bug>
<bug>444826</bug>
<bug>445246</bug>
@@ -74,161 +74,161 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116">CVE-2012-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117">CVE-2012-5117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118">CVE-2012-5118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120">CVE-2012-5120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121">CVE-2012-5121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122">CVE-2012-5122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123">CVE-2012-5123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124">CVE-2012-5124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125">CVE-2012-5125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126">CVE-2012-5126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128">CVE-2012-5128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130">CVE-2012-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132">CVE-2012-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133">CVE-2012-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135">CVE-2012-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136">CVE-2012-5136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137">CVE-2012-5137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138">CVE-2012-5138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139">CVE-2012-5139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140">CVE-2012-5140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141">CVE-2012-5141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142">CVE-2012-5142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143">CVE-2012-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145">CVE-2012-5145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146">CVE-2012-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147">CVE-2012-5147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148">CVE-2012-5148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149">CVE-2012-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150">CVE-2012-5150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151">CVE-2012-5151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152">CVE-2012-5152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153">CVE-2012-5153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154">CVE-2012-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828">CVE-2013-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829">CVE-2013-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830">CVE-2013-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831">CVE-2013-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832">CVE-2013-0832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833">CVE-2013-0833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834">CVE-2013-0834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835">CVE-2013-0835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836">CVE-2013-0836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837">CVE-2013-0837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838">CVE-2013-0838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839">CVE-2013-0839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840">CVE-2013-0840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841">CVE-2013-0841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842">CVE-2013-0842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879">CVE-2013-0879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880">CVE-2013-0880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881">CVE-2013-0881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882">CVE-2013-0882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883">CVE-2013-0883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884">CVE-2013-0884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885">CVE-2013-0885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887">CVE-2013-0887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888">CVE-2013-0888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889">CVE-2013-0889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890">CVE-2013-0890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891">CVE-2013-0891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892">CVE-2013-0892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893">CVE-2013-0893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894">CVE-2013-0894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895">CVE-2013-0895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896">CVE-2013-0896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897">CVE-2013-0897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898">CVE-2013-0898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899">CVE-2013-0899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902">CVE-2013-0902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903">CVE-2013-0903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904">CVE-2013-0904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905">CVE-2013-0905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906">CVE-2013-0906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907">CVE-2013-0907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908">CVE-2013-0908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909">CVE-2013-0909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910">CVE-2013-0910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911">CVE-2013-0911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912">CVE-2013-0912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916">CVE-2013-0916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917">CVE-2013-0917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918">CVE-2013-0918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919">CVE-2013-0919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920">CVE-2013-0920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921">CVE-2013-0921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922">CVE-2013-0922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923">CVE-2013-0923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924">CVE-2013-0924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925">CVE-2013-0925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926">CVE-2013-0926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836">CVE-2013-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837">CVE-2013-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838">CVE-2013-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839">CVE-2013-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840">CVE-2013-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841">CVE-2013-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842">CVE-2013-2842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843">CVE-2013-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844">CVE-2013-2844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845">CVE-2013-2845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846">CVE-2013-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847">CVE-2013-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848">CVE-2013-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849">CVE-2013-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853">CVE-2013-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855">CVE-2013-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856">CVE-2013-2856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857">CVE-2013-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858">CVE-2013-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859">CVE-2013-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860">CVE-2013-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861">CVE-2013-2861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862">CVE-2013-2862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863">CVE-2013-2863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865">CVE-2013-2865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867">CVE-2013-2867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868">CVE-2013-2868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869">CVE-2013-2869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870">CVE-2013-2870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871">CVE-2013-2871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874">CVE-2013-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875">CVE-2013-2875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876">CVE-2013-2876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878">CVE-2013-2878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879">CVE-2013-2879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880">CVE-2013-2880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881">CVE-2013-2881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882">CVE-2013-2882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883">CVE-2013-2883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884">CVE-2013-2884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885">CVE-2013-2885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886">CVE-2013-2886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887">CVE-2013-2887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900">CVE-2013-2900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901">CVE-2013-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902">CVE-2013-2902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903">CVE-2013-2903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904">CVE-2013-2904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905">CVE-2013-2905</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116">CVE-2012-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117">CVE-2012-5117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118">CVE-2012-5118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120">CVE-2012-5120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121">CVE-2012-5121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122">CVE-2012-5122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123">CVE-2012-5123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124">CVE-2012-5124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125">CVE-2012-5125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126">CVE-2012-5126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128">CVE-2012-5128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130">CVE-2012-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132">CVE-2012-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133">CVE-2012-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135">CVE-2012-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136">CVE-2012-5136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137">CVE-2012-5137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138">CVE-2012-5138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139">CVE-2012-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140">CVE-2012-5140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141">CVE-2012-5141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142">CVE-2012-5142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143">CVE-2012-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145">CVE-2012-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146">CVE-2012-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147">CVE-2012-5147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148">CVE-2012-5148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149">CVE-2012-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150">CVE-2012-5150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151">CVE-2012-5151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152">CVE-2012-5152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153">CVE-2012-5153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154">CVE-2012-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828">CVE-2013-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829">CVE-2013-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830">CVE-2013-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831">CVE-2013-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832">CVE-2013-0832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833">CVE-2013-0833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834">CVE-2013-0834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835">CVE-2013-0835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836">CVE-2013-0836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837">CVE-2013-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838">CVE-2013-0838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839">CVE-2013-0839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840">CVE-2013-0840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841">CVE-2013-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842">CVE-2013-0842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879">CVE-2013-0879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880">CVE-2013-0880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881">CVE-2013-0881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882">CVE-2013-0882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883">CVE-2013-0883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884">CVE-2013-0884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885">CVE-2013-0885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887">CVE-2013-0887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888">CVE-2013-0888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889">CVE-2013-0889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890">CVE-2013-0890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891">CVE-2013-0891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892">CVE-2013-0892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893">CVE-2013-0893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894">CVE-2013-0894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895">CVE-2013-0895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896">CVE-2013-0896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897">CVE-2013-0897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898">CVE-2013-0898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899">CVE-2013-0899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902">CVE-2013-0902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903">CVE-2013-0903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904">CVE-2013-0904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905">CVE-2013-0905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906">CVE-2013-0906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907">CVE-2013-0907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908">CVE-2013-0908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909">CVE-2013-0909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910">CVE-2013-0910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911">CVE-2013-0911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912">CVE-2013-0912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916">CVE-2013-0916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917">CVE-2013-0917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918">CVE-2013-0918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919">CVE-2013-0919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920">CVE-2013-0920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921">CVE-2013-0921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922">CVE-2013-0922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923">CVE-2013-0923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924">CVE-2013-0924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925">CVE-2013-0925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926">CVE-2013-0926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836">CVE-2013-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837">CVE-2013-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838">CVE-2013-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839">CVE-2013-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840">CVE-2013-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841">CVE-2013-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842">CVE-2013-2842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843">CVE-2013-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844">CVE-2013-2844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845">CVE-2013-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846">CVE-2013-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847">CVE-2013-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848">CVE-2013-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849">CVE-2013-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853">CVE-2013-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855">CVE-2013-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856">CVE-2013-2856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857">CVE-2013-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858">CVE-2013-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859">CVE-2013-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860">CVE-2013-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861">CVE-2013-2861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862">CVE-2013-2862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863">CVE-2013-2863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865">CVE-2013-2865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867">CVE-2013-2867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868">CVE-2013-2868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869">CVE-2013-2869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870">CVE-2013-2870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871">CVE-2013-2871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874">CVE-2013-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875">CVE-2013-2875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876">CVE-2013-2876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878">CVE-2013-2878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879">CVE-2013-2879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880">CVE-2013-2880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881">CVE-2013-2881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882">CVE-2013-2882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883">CVE-2013-2883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884">CVE-2013-2884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885">CVE-2013-2885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886">CVE-2013-2886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887">CVE-2013-2887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900">CVE-2013-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901">CVE-2013-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902">CVE-2013-2902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903">CVE-2013-2903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904">CVE-2013-2904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905">CVE-2013-2905</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html">
Release Notes 23.0.1271.64
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html">
Release Notes 23.0.1271.91
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html">
Release Notes 23.0.1271.95
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2012 23:45:36 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 20:40:39 +0000">
+ <metadata tag="requester" timestamp="2012-11-07T23:45:36Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-25T20:40:39Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201309-17.xml b/glsa-201309-17.xml
index 0b6f864d..42c7bc34 100644
--- a/glsa-201309-17.xml
+++ b/glsa-201309-17.xml
@@ -6,8 +6,8 @@
Daemon, the worst of which could result in arbitrary code execution.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>471906</bug>
<bug>472400</bug>
<bug>472644</bug>
@@ -45,14 +45,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2163">CVE-2013-2163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724">CVE-2013-3724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3843">CVE-2013-3843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2163">CVE-2013-2163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724">CVE-2013-3724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3843">CVE-2013-3843</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 09:57:28 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T09:57:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:51:51 +0000">
+ <metadata tag="submitter" timestamp="2013-09-25T16:51:51Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-18.xml b/glsa-201309-18.xml
index 71170e1a..15b04ff7 100644
--- a/glsa-201309-18.xml
+++ b/glsa-201309-18.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>454588</bug>
<bug>470096</bug>
<access>remote</access>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0170">CVE-2013-0170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1962">CVE-2013-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0170">CVE-2013-0170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1962">CVE-2013-1962</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2013 00:00:24 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:52:55 +0000">
+ <metadata tag="requester" timestamp="2013-02-26T00:00:24Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-25T16:52:55Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-19.xml b/glsa-201309-19.xml
index efa06117..b233872d 100644
--- a/glsa-201309-19.xml
+++ b/glsa-201309-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tpp</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>474018</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2208">CVE-2013-2208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2208">CVE-2013-2208</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 15:06:40 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T15:06:40Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:53:56 +0000">
+ <metadata tag="submitter" timestamp="2013-09-25T16:53:56Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-20.xml b/glsa-201309-20.xml
index ff48422c..b3645b7a 100644
--- a/glsa-201309-20.xml
+++ b/glsa-201309-20.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">dropbear</product>
- <announced>September 26, 2013</announced>
- <revised>September 26, 2013: 1</revised>
+ <announced>2013-09-26</announced>
+ <revised>2013-09-26: 1</revised>
<bug>328409</bug>
<bug>405607</bug>
<access>remote</access>
@@ -48,15 +48,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920">CVE-2012-0920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920">CVE-2012-0920</uri>
<uri link="https://bugs.gentoo.org/show_bug.cgi?id=328383">libtommath
Gentoo bug
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Mar 2012 20:26:25 +0000">
+ <metadata tag="requester" timestamp="2012-03-03T20:26:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Sep 2013 23:47:21 +0000">
+ <metadata tag="submitter" timestamp="2013-09-26T23:47:21Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-21.xml b/glsa-201309-21.xml
index cfb7fc73..f8371506 100644
--- a/glsa-201309-21.xml
+++ b/glsa-201309-21.xml
@@ -6,8 +6,8 @@
arbitrary shell code.
</synopsis>
<product type="ebuild">klibc</product>
- <announced>September 26, 2013</announced>
- <revised>September 26, 2013: 1</revised>
+ <announced>2013-09-26</announced>
+ <revised>2013-09-26: 1</revised>
<bug>369075</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1930">CVE-2011-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1930">CVE-2011-1930</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Aug 2013 11:18:21 +0000">
+ <metadata tag="requester" timestamp="2013-08-30T11:18:21Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Sep 2013 23:52:30 +0000">
+ <metadata tag="submitter" timestamp="2013-09-26T23:52:30Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-22.xml b/glsa-201309-22.xml
index 6ec23783..be182744 100644
--- a/glsa-201309-22.xml
+++ b/glsa-201309-22.xml
@@ -6,8 +6,8 @@
resulting in remote Denial of Service.
</synopsis>
<product type="ebuild">squid</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>261208</bug>
<bug>389133</bug>
<bug>447596</bug>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801">CVE-2009-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096">CVE-2011-4096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643">CVE-2012-5643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189">CVE-2013-0189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839">CVE-2013-1839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115">CVE-2013-4115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123">CVE-2013-4123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801">CVE-2009-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096">CVE-2011-4096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643">CVE-2012-5643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189">CVE-2013-0189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839">CVE-2013-1839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115">CVE-2013-4115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123">CVE-2013-4123</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:08:59 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 09:34:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:08:59Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-27T09:34:15Z">ackle</metadata>
</glsa>
diff --git a/glsa-201309-23.xml b/glsa-201309-23.xml
index c9679c3c..84ff6bad 100644
--- a/glsa-201309-23.xml
+++ b/glsa-201309-23.xml
@@ -7,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">firefox,thunderbird,seamonkey</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>450940</bug>
<bug>458390</bug>
<bug>460818</bug>
@@ -122,111 +122,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0744">CVE-2013-0744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0745">CVE-2013-0745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0746">CVE-2013-0746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0747">CVE-2013-0747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0748">CVE-2013-0748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0749">CVE-2013-0749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0750">CVE-2013-0750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0751">CVE-2013-0751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0752">CVE-2013-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0753">CVE-2013-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0754">CVE-2013-0754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0755">CVE-2013-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0756">CVE-2013-0756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0757">CVE-2013-0757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0758">CVE-2013-0758</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0759">CVE-2013-0759</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0760">CVE-2013-0760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0761">CVE-2013-0761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0762">CVE-2013-0762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0763">CVE-2013-0763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0764">CVE-2013-0764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0765">CVE-2013-0765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0766">CVE-2013-0766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0767">CVE-2013-0767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0768">CVE-2013-0768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0769">CVE-2013-0769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0770">CVE-2013-0770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0771">CVE-2013-0771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0772">CVE-2013-0772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0773">CVE-2013-0773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0774">CVE-2013-0774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0775">CVE-2013-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0776">CVE-2013-0776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0777">CVE-2013-0777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0778">CVE-2013-0778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0779">CVE-2013-0779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0780">CVE-2013-0780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0781">CVE-2013-0781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0782">CVE-2013-0782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0783">CVE-2013-0783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0784">CVE-2013-0784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0787">CVE-2013-0787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0788">CVE-2013-0788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0789">CVE-2013-0789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0791">CVE-2013-0791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0792">CVE-2013-0792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0793">CVE-2013-0793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0794">CVE-2013-0794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0795">CVE-2013-0795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0796">CVE-2013-0796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0797">CVE-2013-0797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0799">CVE-2013-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0800">CVE-2013-0800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0801">CVE-2013-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1670">CVE-2013-1670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1671">CVE-2013-1671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1674">CVE-2013-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1675">CVE-2013-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1676">CVE-2013-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1677">CVE-2013-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1678">CVE-2013-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1679">CVE-2013-1679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1680">CVE-2013-1680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1681">CVE-2013-1681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1682">CVE-2013-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1684">CVE-2013-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1687">CVE-2013-1687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1690">CVE-2013-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1692">CVE-2013-1692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1693">CVE-2013-1693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1694">CVE-2013-1694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1697">CVE-2013-1697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1701">CVE-2013-1701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1702">CVE-2013-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1704">CVE-2013-1704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1705">CVE-2013-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1707">CVE-2013-1707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1708">CVE-2013-1708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1709">CVE-2013-1709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1710">CVE-2013-1710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1711">CVE-2013-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1712">CVE-2013-1712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1713">CVE-2013-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1714">CVE-2013-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1717">CVE-2013-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1718">CVE-2013-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1719">CVE-2013-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1720">CVE-2013-1720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1722">CVE-2013-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1723">CVE-2013-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1724">CVE-2013-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1725">CVE-2013-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1726">CVE-2013-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1728">CVE-2013-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1730">CVE-2013-1730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1732">CVE-2013-1732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1735">CVE-2013-1735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1736">CVE-2013-1736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1737">CVE-2013-1737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1738">CVE-2013-1738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0744">CVE-2013-0744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0745">CVE-2013-0745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0746">CVE-2013-0746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0747">CVE-2013-0747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0748">CVE-2013-0748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0749">CVE-2013-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0750">CVE-2013-0750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0751">CVE-2013-0751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0752">CVE-2013-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0753">CVE-2013-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0754">CVE-2013-0754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0755">CVE-2013-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0756">CVE-2013-0756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0757">CVE-2013-0757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0758">CVE-2013-0758</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0759">CVE-2013-0759</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0760">CVE-2013-0760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0761">CVE-2013-0761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0762">CVE-2013-0762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0763">CVE-2013-0763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0764">CVE-2013-0764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0765">CVE-2013-0765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0766">CVE-2013-0766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0767">CVE-2013-0767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0768">CVE-2013-0768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0769">CVE-2013-0769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0770">CVE-2013-0770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0771">CVE-2013-0771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0772">CVE-2013-0772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0773">CVE-2013-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0774">CVE-2013-0774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0775">CVE-2013-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0776">CVE-2013-0776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0777">CVE-2013-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0778">CVE-2013-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0779">CVE-2013-0779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0780">CVE-2013-0780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0781">CVE-2013-0781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0782">CVE-2013-0782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0783">CVE-2013-0783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0784">CVE-2013-0784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0787">CVE-2013-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0788">CVE-2013-0788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0789">CVE-2013-0789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0791">CVE-2013-0791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0792">CVE-2013-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0793">CVE-2013-0793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0794">CVE-2013-0794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0795">CVE-2013-0795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0796">CVE-2013-0796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0797">CVE-2013-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0799">CVE-2013-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0800">CVE-2013-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0801">CVE-2013-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1670">CVE-2013-1670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1671">CVE-2013-1671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1674">CVE-2013-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1675">CVE-2013-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1676">CVE-2013-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1677">CVE-2013-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1678">CVE-2013-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1679">CVE-2013-1679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1680">CVE-2013-1680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1681">CVE-2013-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1682">CVE-2013-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1684">CVE-2013-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1687">CVE-2013-1687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1690">CVE-2013-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1692">CVE-2013-1692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1693">CVE-2013-1693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1694">CVE-2013-1694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1697">CVE-2013-1697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1701">CVE-2013-1701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1702">CVE-2013-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1704">CVE-2013-1704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1705">CVE-2013-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1707">CVE-2013-1707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1708">CVE-2013-1708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1709">CVE-2013-1709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1710">CVE-2013-1710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1711">CVE-2013-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1712">CVE-2013-1712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1713">CVE-2013-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1714">CVE-2013-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1717">CVE-2013-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1718">CVE-2013-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1719">CVE-2013-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1720">CVE-2013-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1722">CVE-2013-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1723">CVE-2013-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1724">CVE-2013-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1725">CVE-2013-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1726">CVE-2013-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1728">CVE-2013-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1730">CVE-2013-1730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1732">CVE-2013-1732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1735">CVE-2013-1735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1736">CVE-2013-1736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1737">CVE-2013-1737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1738">CVE-2013-1738</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jul 2013 01:55:45 +0000">
+ <metadata tag="requester" timestamp="2013-07-12T01:55:45Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 20:18:53 +0000">
+ <metadata tag="submitter" timestamp="2013-09-27T20:18:53Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201309-24.xml b/glsa-201309-24.xml
index 1b342254..469cfec8 100644
--- a/glsa-201309-24.xml
+++ b/glsa-201309-24.xml
@@ -7,8 +7,8 @@
Service, or gain access to data on the host.
</synopsis>
<product type="ebuild">xen</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>385319</bug>
<bug>386371</bug>
<bug>420875</bug>
@@ -89,68 +89,68 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901">CVE-2011-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262">CVE-2011-3262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217">CVE-2012-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218">CVE-2012-0218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934">CVE-2012-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432">CVE-2012-3432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433">CVE-2012-3433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510">CVE-2012-5510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511">CVE-2012-5511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512">CVE-2012-5512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513">CVE-2012-5513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514">CVE-2012-5514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515">CVE-2012-5515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525">CVE-2012-5525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634">CVE-2012-5634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075">CVE-2012-6075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333">CVE-2012-6333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151">CVE-2013-0151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152">CVE-2013-0152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153">CVE-2013-0153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154">CVE-2013-0154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215">CVE-2013-0215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432">CVE-2013-1432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917">CVE-2013-1917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918">CVE-2013-1918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919">CVE-2013-1919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920">CVE-2013-1920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922">CVE-2013-1922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952">CVE-2013-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964">CVE-2013-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076">CVE-2013-2076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077">CVE-2013-2077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078">CVE-2013-2078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194">CVE-2013-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195">CVE-2013-2195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196">CVE-2013-2196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211">CVE-2013-2211</uri>
- <uri link="http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901">CVE-2011-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262">CVE-2011-3262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217">CVE-2012-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218">CVE-2012-0218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934">CVE-2012-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432">CVE-2012-3432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433">CVE-2012-3433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510">CVE-2012-5510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511">CVE-2012-5511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512">CVE-2012-5512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513">CVE-2012-5513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514">CVE-2012-5514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515">CVE-2012-5515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525">CVE-2012-5525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634">CVE-2012-5634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075">CVE-2012-6075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333">CVE-2012-6333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151">CVE-2013-0151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152">CVE-2013-0152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153">CVE-2013-0153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154">CVE-2013-0154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215">CVE-2013-0215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432">CVE-2013-1432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917">CVE-2013-1917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918">CVE-2013-1918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919">CVE-2013-1919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920">CVE-2013-1920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922">CVE-2013-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952">CVE-2013-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964">CVE-2013-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076">CVE-2013-2076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077">CVE-2013-2077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078">CVE-2013-2078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194">CVE-2013-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195">CVE-2013-2195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196">CVE-2013-2196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211">CVE-2013-2211</uri>
+ <uri link="https://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html">
Xen TMEM
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:02:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 20:19:09 +0000">
+ <metadata tag="requester" timestamp="2012-03-06T01:02:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-27T20:19:09Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201310-01.xml b/glsa-201310-01.xml
index bfef3f91..839ab48a 100644
--- a/glsa-201310-01.xml
+++ b/glsa-201310-01.xml
@@ -6,8 +6,8 @@
allowing a remote attacker to execute arbitrary Perl code.
</synopsis>
<product type="ebuild">Module-Signature</product>
- <announced>October 04, 2013</announced>
- <revised>October 04, 2013: 1</revised>
+ <announced>2013-10-04</announced>
+ <revised>2013-10-04: 1</revised>
<bug>472428</bug>
<access>remote</access>
<affected>
@@ -51,12 +51,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2145">CVE-2013-2145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2145">CVE-2013-2145</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Aug 2013 11:15:28 +0000">
+ <metadata tag="requester" timestamp="2013-08-21T11:15:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Oct 2013 06:56:47 +0000">
+ <metadata tag="submitter" timestamp="2013-10-04T06:56:47Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201310-02.xml b/glsa-201310-02.xml
index 29b3470a..5343be62 100644
--- a/glsa-201310-02.xml
+++ b/glsa-201310-02.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">isync</product>
- <announced>October 05, 2013</announced>
- <revised>October 05, 2013: 1</revised>
+ <announced>2013-10-05</announced>
+ <revised>2013-10-05: 1</revised>
<bug>458420</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0289">CVE-2013-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0289">CVE-2013-0289</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Apr 2013 23:32:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Oct 2013 20:45:35 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-08T23:32:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-05T20:45:35Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-03.xml b/glsa-201310-03.xml
index 4b2f41de..f1acb57e 100644
--- a/glsa-201310-03.xml
+++ b/glsa-201310-03.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>263028</bug>
<bug>290430</bug>
<bug>290464</bug>
@@ -51,40 +51,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0146">CVE-2009-0146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0147">CVE-2009-0147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0165">CVE-2009-0165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0166">CVE-2009-0166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0195">CVE-2009-0195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0799">CVE-2009-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0800">CVE-2009-0800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1179">CVE-2009-1179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1180">CVE-2009-1180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1181">CVE-2009-1181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1182">CVE-2009-1182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1183">CVE-2009-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1187">CVE-2009-1187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1188">CVE-2009-1188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603">CVE-2009-3603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604">CVE-2009-3604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3605">CVE-2009-3605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606">CVE-2009-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607">CVE-2009-3607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608">CVE-2009-3608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609">CVE-2009-3609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3938">CVE-2009-3938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3703">CVE-2010-3703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4653">CVE-2010-4653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4654">CVE-2010-4654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2142">CVE-2012-2142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1788">CVE-2013-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1789">CVE-2013-1789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1790">CVE-2013-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0146">CVE-2009-0146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0147">CVE-2009-0147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0165">CVE-2009-0165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0166">CVE-2009-0166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0195">CVE-2009-0195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0799">CVE-2009-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0800">CVE-2009-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1179">CVE-2009-1179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1180">CVE-2009-1180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1181">CVE-2009-1181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1182">CVE-2009-1182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1183">CVE-2009-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1187">CVE-2009-1187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1188">CVE-2009-1188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603">CVE-2009-3603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604">CVE-2009-3604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3605">CVE-2009-3605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606">CVE-2009-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607">CVE-2009-3607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608">CVE-2009-3608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609">CVE-2009-3609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3938">CVE-2009-3938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3703">CVE-2010-3703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4653">CVE-2010-4653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4654">CVE-2010-4654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2142">CVE-2012-2142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1788">CVE-2013-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1789">CVE-2013-1789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1790">CVE-2013-1790</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:55 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 15:45:26 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T15:45:26Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-04.xml b/glsa-201310-04.xml
index d5883652..f19e81d9 100644
--- a/glsa-201310-04.xml
+++ b/glsa-201310-04.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>458726</bug>
<bug>468870</bug>
<access>local, remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0337">CVE-2013-0337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2028">CVE-2013-2028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2070">CVE-2013-2070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0337">CVE-2013-0337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2028">CVE-2013-2028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2070">CVE-2013-2070</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 22:53:05 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 21:49:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T22:53:05Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T21:49:01Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-05.xml b/glsa-201310-05.xml
index 9201a431..10dea9c6 100644
--- a/glsa-201310-05.xml
+++ b/glsa-201310-05.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gegl</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>442016</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4433">CVE-2012-4433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4433">CVE-2012-4433</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:10:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 22:25:22 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:10:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T22:25:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-06.xml b/glsa-201310-06.xml
index 69dbcddc..fa7a305a 100644
--- a/glsa-201310-06.xml
+++ b/glsa-201310-06.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>October 07, 2013</announced>
- <revised>October 07, 2013: 1</revised>
+ <announced>2013-10-07</announced>
+ <revised>2013-10-07: 1</revised>
<bug>311797</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1159">CVE-2010-1159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1159">CVE-2010-1159</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Dec 2012 23:18:18 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Oct 2013 08:46:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-23T23:18:18Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-07T08:46:58Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-07.xml b/glsa-201310-07.xml
index 71f7d82e..416ef242 100644
--- a/glsa-201310-07.xml
+++ b/glsa-201310-07.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>412895</bug>
<bug>425772</bug>
<bug>433766</bug>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5030">CVE-2009-5030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3358">CVE-2012-3358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3535">CVE-2012-3535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5030">CVE-2009-5030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3358">CVE-2012-3358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3535">CVE-2012-3535</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:22:41 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 11:18:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-29T15:22:41Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T11:18:57Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-08.xml b/glsa-201310-08.xml
index 0a9c7547..9a232d2e 100644
--- a/glsa-201310-08.xml
+++ b/glsa-201310-08.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>408507</bug>
<bug>475706</bug>
<access>remote</access>
@@ -44,14 +44,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249">CVE-2012-0249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250">CVE-2012-0250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255">CVE-2012-0255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820">CVE-2012-1820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236">CVE-2013-2236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249">CVE-2012-0249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250">CVE-2012-0250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255">CVE-2012-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820">CVE-2012-1820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236">CVE-2013-2236</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jan 2013 19:08:42 +0000">
+ <metadata tag="requester" timestamp="2013-01-02T19:08:42Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 11:51:02 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T11:51:02Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-09.xml b/glsa-201310-09.xml
index 06e57cb3..c102f1d6 100644
--- a/glsa-201310-09.xml
+++ b/glsa-201310-09.xml
@@ -6,8 +6,8 @@
perform man-in-the-middle attacks.
</synopsis>
<product type="ebuild">setuptools</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>479964</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1633">CVE-2013-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1633">CVE-2013-1633</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:36:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 12:13:55 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-29T15:36:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T12:13:55Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-10.xml b/glsa-201310-10.xml
index ce5baffa..8fb5d7ef 100644
--- a/glsa-201310-10.xml
+++ b/glsa-201310-10.xml
@@ -6,8 +6,8 @@
which might allow a remote attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">PolarSSL</product>
- <announced>October 17, 2013</announced>
- <revised>October 17, 2013: 1</revised>
+ <announced>2013-10-17</announced>
+ <revised>2013-10-17: 1</revised>
<bug>358783</bug>
<bug>416399</bug>
<bug>455562</bug>
@@ -47,13 +47,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1923">CVE-2011-1923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2130">CVE-2012-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1621">CVE-2013-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4623">CVE-2013-4623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5915">CVE-2013-5915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1923">CVE-2011-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2130">CVE-2012-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1621">CVE-2013-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4623">CVE-2013-4623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5915">CVE-2013-5915</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:30:33 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Oct 2013 08:18:11 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:30:33Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-17T08:18:11Z">craig</metadata>
</glsa>
diff --git a/glsa-201310-11.xml b/glsa-201310-11.xml
index 593beb44..9bbb2a22 100644
--- a/glsa-201310-11.xml
+++ b/glsa-201310-11.xml
@@ -6,8 +6,8 @@
Parallel-ForkManager module, possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Parallel-ForkManager</product>
- <announced>October 17, 2013</announced>
- <revised>October 17, 2013: 1</revised>
+ <announced>2013-10-17</announced>
+ <revised>2013-10-17: 1</revised>
<bug>389839</bug>
<access>local</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4115">CVE-2011-4115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4115">CVE-2011-4115</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jan 2013 18:47:58 +0000">
+ <metadata tag="requester" timestamp="2013-01-02T18:47:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Oct 2013 08:42:08 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-17T08:42:08Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-12.xml b/glsa-201310-12.xml
index 5824c642..4c6bb7f1 100644
--- a/glsa-201310-12.xml
+++ b/glsa-201310-12.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">FFmpeg</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>285719</bug>
<bug>307755</bug>
<bug>339036</bug>
@@ -68,102 +68,102 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4631">CVE-2009-4631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4632">CVE-2009-4632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4633">CVE-2009-4633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4634">CVE-2009-4634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4635">CVE-2009-4635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4636">CVE-2009-4636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4637">CVE-2009-4637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4638">CVE-2009-4638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4639">CVE-2009-4639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4640">CVE-2009-4640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3908">CVE-2010-3908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4705">CVE-2010-4705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1931">CVE-2011-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3362">CVE-2011-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3893">CVE-2011-3893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3895">CVE-2011-3895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3941">CVE-2011-3941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3944">CVE-2011-3944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3949">CVE-2011-3949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3950">CVE-2011-3950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3973">CVE-2011-3973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3974">CVE-2011-3974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4351">CVE-2011-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4352">CVE-2011-4352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4353">CVE-2011-4353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4364">CVE-2011-4364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2771">CVE-2012-2771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2773">CVE-2012-2773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2774">CVE-2012-2774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2778">CVE-2012-2778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2780">CVE-2012-2780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2781">CVE-2012-2781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2782">CVE-2012-2782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2785">CVE-2012-2785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2792">CVE-2012-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2795">CVE-2012-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2799">CVE-2012-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2805">CVE-2012-2805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3670">CVE-2013-3670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3671">CVE-2013-3671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3673">CVE-2013-3673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3675">CVE-2013-3675</uri>
- <uri link="http://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/0.10">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4631">CVE-2009-4631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4632">CVE-2009-4632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4633">CVE-2009-4633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4634">CVE-2009-4634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4635">CVE-2009-4635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4636">CVE-2009-4636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4637">CVE-2009-4637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4638">CVE-2009-4638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4639">CVE-2009-4639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4640">CVE-2009-4640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3908">CVE-2010-3908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4705">CVE-2010-4705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1931">CVE-2011-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3362">CVE-2011-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3893">CVE-2011-3893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3895">CVE-2011-3895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3941">CVE-2011-3941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3944">CVE-2011-3944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3949">CVE-2011-3949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3950">CVE-2011-3950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3973">CVE-2011-3973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3974">CVE-2011-3974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4351">CVE-2011-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4352">CVE-2011-4352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4353">CVE-2011-4353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4364">CVE-2011-4364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2771">CVE-2012-2771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2773">CVE-2012-2773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2774">CVE-2012-2774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2778">CVE-2012-2778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2780">CVE-2012-2780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2781">CVE-2012-2781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2782">CVE-2012-2782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2785">CVE-2012-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2792">CVE-2012-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2795">CVE-2012-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2799">CVE-2012-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2805">CVE-2012-2805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3670">CVE-2013-3670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3671">CVE-2013-3671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3673">CVE-2013-3673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3675">CVE-2013-3675</uri>
+ <uri link="https://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/0.10">
FFmpeg 0.10.x Changelog
</uri>
- <uri link="http://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/1.0">
+ <uri link="https://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/1.0">
FFmpeg 1.0.x Changelog
</uri>
<uri link="http://archives.neohapsis.com/archives/bugtraq/2011-04/0258.html">
NGS Secure Research NGS00068
</uri>
- <uri link="http://secunia.com/advisories/36760/">Secunia Advisory SA36760</uri>
+ <uri link="https://secunia.com/advisories/36760/">Secunia Advisory SA36760</uri>
<uri link="https://secunia.com/advisories/46134/">Secunia Advisory SA46134</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 18:49:10 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-25T18:49:10Z">craig</metadata>
</glsa>
diff --git a/glsa-201310-13.xml b/glsa-201310-13.xml
index 4780a41f..6e0f1cb7 100644
--- a/glsa-201310-13.xml
+++ b/glsa-201310-13.xml
@@ -6,8 +6,8 @@
FFmpeg, the worst of which may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>253649</bug>
<bug>279342</bug>
<bug>339037</bug>
@@ -48,17 +48,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6718">CVE-2007-6718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4610">CVE-2008-4610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3625">CVE-2011-3625</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-201310-12.xml">FFmpeg:
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6718">CVE-2007-6718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4610">CVE-2008-4610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3625">CVE-2011-3625</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-201310-12.xml">FFmpeg:
Multiple Vulnerabilities
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:04 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 18:54:56 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:04Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2013-10-25T18:54:56Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201310-14.xml b/glsa-201310-14.xml
index e91ae173..d19215af 100644
--- a/glsa-201310-14.xml
+++ b/glsa-201310-14.xml
@@ -6,8 +6,8 @@
context-dependent attackers to conduct symlink attacks.
</synopsis>
<product type="ebuild">groff</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>386335</bug>
<access>local, remote</access>
<affected>
@@ -41,17 +41,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5044">CVE-2009-5044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5078">CVE-2009-5078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5079">CVE-2009-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5080">CVE-2009-5080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5081">CVE-2009-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5082">CVE-2009-5082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5044">CVE-2009-5044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5078">CVE-2009-5078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5079">CVE-2009-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5080">CVE-2009-5080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5081">CVE-2009-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5082">CVE-2009-5082</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 02:36:54 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T02:36:54Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 22:46:33 +0000">
+ <metadata tag="submitter" timestamp="2013-10-25T22:46:33Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201310-15.xml b/glsa-201310-15.xml
index b7061efc..18737592 100644
--- a/glsa-201310-15.xml
+++ b/glsa-201310-15.xml
@@ -7,8 +7,8 @@
an Automake-based build.
</synopsis>
<product type="ebuild">automake</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>295357</bug>
<bug>426336</bug>
<access>local</access>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3386">CVE-2012-3386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3386">CVE-2012-3386</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:36 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:36Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 23:54:51 +0000">
+ <metadata tag="submitter" timestamp="2013-10-25T23:54:51Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201310-16.xml b/glsa-201310-16.xml
index 94d30193..2d53f7d6 100644
--- a/glsa-201310-16.xml
+++ b/glsa-201310-16.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">tptest</product>
- <announced>October 26, 2013</announced>
- <revised>October 26, 2013: 1</revised>
+ <announced>2013-10-26</announced>
+ <revised>2013-10-26: 1</revised>
<bug>261191</bug>
<access>remote</access>
<affected>
@@ -42,13 +42,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0650">CVE-2009-0650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0659">CVE-2009-0659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0650">CVE-2009-0650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0659">CVE-2009-0659</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 10:39:46 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T10:39:46Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Oct 2013 20:08:51 +0000">
+ <metadata tag="submitter" timestamp="2013-10-26T20:08:51Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201310-17.xml b/glsa-201310-17.xml
index df19f7bc..bc6f510b 100644
--- a/glsa-201310-17.xml
+++ b/glsa-201310-17.xml
@@ -6,8 +6,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">pmake</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 2</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 2</revised>
<bug>367891</bug>
<access>local</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1920">CVE-2011-1920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1920">CVE-2011-1920</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:19:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 11:31:35 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:19:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T11:31:35Z">craig</metadata>
</glsa>
diff --git a/glsa-201310-18.xml b/glsa-201310-18.xml
index a44d5469..fb3222c7 100644
--- a/glsa-201310-18.xml
+++ b/glsa-201310-18.xml
@@ -6,8 +6,8 @@
of which could lead to Denial of Service.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>455560</bug>
<bug>471788</bug>
<access>remote</access>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1619">CVE-2013-1619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2116">CVE-2013-2116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1619">CVE-2013-1619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2116">CVE-2013-2116</uri>
<uri link="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">Lucky Thirteen:
Breaking the TLS and DTLS Record Protocols
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:32:51 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:32:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 11:33:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T11:33:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-19.xml b/glsa-201310-19.xml
index 0ce1fc17..bc2e18c7 100644
--- a/glsa-201310-19.xml
+++ b/glsa-201310-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">x2goserver</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>472582</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4376">CVE-2013-4376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4376">CVE-2013-4376</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 15:02:19 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T15:02:19Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 12:03:05 +0000">
+ <metadata tag="submitter" timestamp="2013-10-28T12:03:05Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201310-20.xml b/glsa-201310-20.xml
index 66fdd9c1..af17b2b8 100644
--- a/glsa-201310-20.xml
+++ b/glsa-201310-20.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">acpid</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>434522</bug>
<access>local</access>
<affected>
@@ -37,8 +37,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2777">CVE-2011-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2777">CVE-2011-2777</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2012 14:31:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 16:52:47 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-18T14:31:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T16:52:47Z">ackle</metadata>
</glsa>
diff --git a/glsa-201310-21.xml b/glsa-201310-21.xml
index e3e2788b..b967c621 100644
--- a/glsa-201310-21.xml
+++ b/glsa-201310-21.xml
@@ -6,8 +6,8 @@
which could lead to Denial of Service.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>460352</bug>
<bug>466124</bug>
<bug>468110</bug>
@@ -62,24 +62,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1816">CVE-2013-1816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1817">CVE-2013-1817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1818">CVE-2013-1818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1951">CVE-2013-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2031">CVE-2013-2031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2032">CVE-2013-2032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2114">CVE-2013-2114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4301">CVE-2013-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4302">CVE-2013-4302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4303">CVE-2013-4303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4304">CVE-2013-4304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4305">CVE-2013-4305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4306">CVE-2013-4306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4307">CVE-2013-4307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4308">CVE-2013-4308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1816">CVE-2013-1816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1817">CVE-2013-1817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1818">CVE-2013-1818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1951">CVE-2013-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2031">CVE-2013-2031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2032">CVE-2013-2032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2114">CVE-2013-2114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4301">CVE-2013-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4302">CVE-2013-4302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4303">CVE-2013-4303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4304">CVE-2013-4304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4305">CVE-2013-4305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4306">CVE-2013-4306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4307">CVE-2013-4307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4308">CVE-2013-4308</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:36:35 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:36:35Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 16:56:03 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T16:56:03Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-01.xml b/glsa-201311-01.xml
index 68ac8bbd..af4e4596 100644
--- a/glsa-201311-01.xml
+++ b/glsa-201311-01.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mednafen</product>
- <announced>November 04, 2013</announced>
- <revised>November 04, 2013: 1</revised>
+ <announced>2013-11-04</announced>
+ <revised>2013-11-04: 1</revised>
<bug>326141</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3085">CVE-2010-3085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3085">CVE-2010-3085</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:38 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:38Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Nov 2013 11:26:30 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-04T11:26:30Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-02.xml b/glsa-201311-02.xml
index 7176a14b..a0e2f185 100644
--- a/glsa-201311-02.xml
+++ b/glsa-201311-02.xml
@@ -7,8 +7,8 @@
or conduct other attacks.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>November 04, 2013</announced>
- <revised>November 04, 2013: 1</revised>
+ <announced>2013-11-04</announced>
+ <revised>2013-11-04: 1</revised>
<bug>465420</bug>
<bug>467080</bug>
<bug>478696</bug>
@@ -48,20 +48,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1937">CVE-2013-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3238">CVE-2013-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3239">CVE-2013-3239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4995">CVE-2013-4995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4996">CVE-2013-4996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4997">CVE-2013-4997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4998">CVE-2013-4998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4999">CVE-2013-4999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5000">CVE-2013-5000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5001">CVE-2013-5001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5002">CVE-2013-5002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5003">CVE-2013-5003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5029">CVE-2013-5029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1937">CVE-2013-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3238">CVE-2013-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3239">CVE-2013-3239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4995">CVE-2013-4995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4996">CVE-2013-4996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4997">CVE-2013-4997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4998">CVE-2013-4998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4999">CVE-2013-4999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5000">CVE-2013-5000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5001">CVE-2013-5001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5002">CVE-2013-5002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5003">CVE-2013-5003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5029">CVE-2013-5029</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Aug 2013 20:08:03 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Nov 2013 11:28:46 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2013-08-24T20:08:03Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2013-11-04T11:28:46Z">a3li</metadata>
</glsa>
diff --git a/glsa-201311-03.xml b/glsa-201311-03.xml
index b1b6c99b..9a83e481 100644
--- a/glsa-201311-03.xml
+++ b/glsa-201311-03.xml
@@ -6,8 +6,8 @@
SQL injection.
</synopsis>
<product type="ebuild">quassel</product>
- <announced>November 07, 2013</announced>
- <revised>November 07, 2013: 1</revised>
+ <announced>2013-11-07</announced>
+ <revised>2013-11-07: 1</revised>
<bug>338879</bug>
<bug>487632</bug>
<access>remote</access>
@@ -52,11 +52,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3443">CVE-2010-3443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4422">CVE-2013-4422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3443">CVE-2010-3443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4422">CVE-2013-4422</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:21 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:21Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Nov 2013 01:26:59 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-07T01:26:59Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-04.xml b/glsa-201311-04.xml
index 5a75da42..31015d6a 100644
--- a/glsa-201311-04.xml
+++ b/glsa-201311-04.xml
@@ -6,8 +6,8 @@
attackers to conduct symlink attacks.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>November 07, 2013</announced>
- <revised>November 07, 2013: 1</revised>
+ <announced>2013-11-07</announced>
+ <revised>2013-11-07: 1</revised>
<bug>308055</bug>
<access>local</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0424">CVE-2010-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0424">CVE-2010-0424</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Nov 2013 03:18:24 +0000">
+ <metadata tag="requester" timestamp="2013-11-04T03:18:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Nov 2013 01:56:36 +0000">
+ <metadata tag="submitter" timestamp="2013-11-07T01:56:36Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201311-05.xml b/glsa-201311-05.xml
index 9bd9cdb7..bdc784e0 100644
--- a/glsa-201311-05.xml
+++ b/glsa-201311-05.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>November 10, 2013</announced>
- <revised>November 10, 2013: 1</revised>
+ <announced>2013-11-10</announced>
+ <revised>2013-11-10: 1</revised>
<bug>434580</bug>
<bug>444280</bug>
<access>remote</access>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3403">CVE-2012-3403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3481">CVE-2012-3481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5576">CVE-2012-5576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3403">CVE-2012-3403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3481">CVE-2012-3481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5576">CVE-2012-5576</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2012 02:48:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Nov 2013 14:50:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-30T02:48:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-10T14:50:48Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-06.xml b/glsa-201311-06.xml
index 912be6b5..42d50228 100644
--- a/glsa-201311-06.xml
+++ b/glsa-201311-06.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>November 10, 2013</announced>
- <revised>November 10, 2013: 1</revised>
+ <announced>2013-11-10</announced>
+ <revised>2013-11-10: 1</revised>
<bug>434344</bug>
<bug>444836</bug>
<bug>458430</bug>
@@ -48,13 +48,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2871">CVE-2012-2871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5134">CVE-2012-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2871">CVE-2012-2871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5134">CVE-2012-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Sep 2012 19:04:07 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Nov 2013 14:54:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-18T19:04:07Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-10T14:54:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-07.xml b/glsa-201311-07.xml
index 51118aa2..bfdb35db 100644
--- a/glsa-201311-07.xml
+++ b/glsa-201311-07.xml
@@ -6,8 +6,8 @@
which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>219008</bug>
<bug>293130</bug>
<access>local, remote</access>
@@ -43,14 +43,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1102">CVE-2008-1102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1103">CVE-2008-1103</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3850">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1102">CVE-2008-1102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1103">CVE-2008-1103</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3850">
CVE-2009-3850
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:20 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:20Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:12:41 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:12:41Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-08.xml b/glsa-201311-08.xml
index 438fdecc..4db96b20 100644
--- a/glsa-201311-08.xml
+++ b/glsa-201311-08.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>308025</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4274">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4274">
CVE-2009-4274
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:16 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:13:34 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:16Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:13:34Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-09.xml b/glsa-201311-09.xml
index 61520763..27b936d2 100644
--- a/glsa-201311-09.xml
+++ b/glsa-201311-09.xml
@@ -6,8 +6,8 @@
of which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>339389</bug>
<bug>386183</bug>
<bug>434802</bug>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3696">CVE-2010-3696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3697">CVE-2010-3697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2701">CVE-2011-2701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3547">CVE-2012-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3696">CVE-2010-3696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3697">CVE-2010-3697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2701">CVE-2011-2701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3547">CVE-2012-3547</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 00:59:15 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:43:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T00:59:15Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:43:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-10.xml b/glsa-201311-10.xml
index 28e326c9..d3a2c4e2 100644
--- a/glsa-201311-10.xml
+++ b/glsa-201311-10.xml
@@ -7,8 +7,8 @@
Service condition.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>November 19, 2013</announced>
- <revised>November 19, 2013: 1</revised>
+ <announced>2013-11-19</announced>
+ <revised>2013-11-19: 1</revised>
<bug>365769</bug>
<bug>488050</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1097">CVE-2008-1097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1882">CVE-2009-1882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4589">CVE-2013-4589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1097">CVE-2008-1097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1882">CVE-2009-1882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4589">CVE-2013-4589</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Feb 2013 15:58:45 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Nov 2013 00:09:06 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-02-24T15:58:45Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-19T00:09:06Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-11.xml b/glsa-201311-11.xml
index 28819ea4..9e936ff5 100644
--- a/glsa-201311-11.xml
+++ b/glsa-201311-11.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">ctorrent</product>
- <announced>November 20, 2013</announced>
- <revised>November 22, 2013: 2</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-22: 2</revised>
<bug>266953</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759">
CVE-2009-1759
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:38 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:38Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Nov 2013 10:00:47 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-22T10:00:47Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-12.xml b/glsa-201311-12.xml
index 4cc45585..3a43a0ab 100644
--- a/glsa-201311-12.xml
+++ b/glsa-201311-12.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">opendchub</product>
- <announced>November 20, 2013</announced>
- <revised>November 20, 2013: 1</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-20: 1</revised>
<bug>314551</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1147">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1147">
CVE-2010-1147
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:01Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Nov 2013 10:00:54 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-20T10:00:54Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-13.xml b/glsa-201311-13.xml
index 2cd73429..af78f768 100644
--- a/glsa-201311-13.xml
+++ b/glsa-201311-13.xml
@@ -6,8 +6,8 @@
remote attackers to read encrypted traffic.
</synopsis>
<product type="ebuild">openvpn</product>
- <announced>November 20, 2013</announced>
- <revised>November 20, 2013: 1</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-20: 1</revised>
<bug>293894</bug>
<bug>468756</bug>
<access>remote</access>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2061">CVE-2013-2061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2061">CVE-2013-2061</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:49:37 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:49:37Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Nov 2013 10:13:40 +0000">
+ <metadata tag="submitter" timestamp="2013-11-20T10:13:40Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201311-14.xml b/glsa-201311-14.xml
index a24378da..93ea1009 100644
--- a/glsa-201311-14.xml
+++ b/glsa-201311-14.xml
@@ -7,8 +7,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">qt-core qt-gui</product>
- <announced>November 22, 2013</announced>
- <revised>November 22, 2013: 1</revised>
+ <announced>2013-11-22</announced>
+ <revised>2013-11-22: 1</revised>
<bug>361401</bug>
<bug>382171</bug>
<bug>384103</bug>
@@ -64,8 +64,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3193">CVE-2011-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0254">CVE-2013-0254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3193">CVE-2011-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0254">CVE-2013-0254</uri>
<uri link="http://labs.qt.nokia.com/2011/03/29/security-advisory-fraudulent-certificates/">
Security advisory: Fraudulent certificates
</uri>
@@ -73,8 +73,8 @@
What the DigiNotar security breach means for Qt users
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 May 2012 06:36:48 +0000">
+ <metadata tag="requester" timestamp="2012-05-15T06:36:48Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Nov 2013 10:54:16 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-22T10:54:16Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-15.xml b/glsa-201311-15.xml
index c2d5aa16..8bc2cd85 100644
--- a/glsa-201311-15.xml
+++ b/glsa-201311-15.xml
@@ -7,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>November 25, 2013</announced>
- <revised>November 25, 2013: 1</revised>
+ <announced>2013-11-25</announced>
+ <revised>2013-11-25: 1</revised>
<bug>312875</bug>
<bug>394497</bug>
<bug>428372</bug>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277">CVE-2010-1277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904">CVE-2011-2904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263">CVE-2011-3263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674">CVE-2011-4674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435">CVE-2012-3435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364">CVE-2013-1364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572">CVE-2013-5572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277">CVE-2010-1277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904">CVE-2011-2904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263">CVE-2011-3263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674">CVE-2011-4674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435">CVE-2012-3435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364">CVE-2013-1364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572">CVE-2013-5572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:48 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Nov 2013 17:22:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:48Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-25T17:22:15Z">ackle</metadata>
</glsa>
diff --git a/glsa-201311-16.xml b/glsa-201311-16.xml
index 2d49e406..5805bc1f 100644
--- a/glsa-201311-16.xml
+++ b/glsa-201311-16.xml
@@ -6,8 +6,8 @@
to conduct symlink attacks.
</synopsis>
<product type="ebuild">fcron</product>
- <announced>November 25, 2013</announced>
- <revised>November 25, 2013: 1</revised>
+ <announced>2013-11-25</announced>
+ <revised>2013-11-25: 1</revised>
<bug>308075</bug>
<access>local</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0792">CVE-2010-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0792">CVE-2010-0792</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:12 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:12Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Nov 2013 17:22:51 +0000">
+ <metadata tag="submitter" timestamp="2013-11-25T17:22:51Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201311-17.xml b/glsa-201311-17.xml
index 13e1b43f..452fd319 100644
--- a/glsa-201311-17.xml
+++ b/glsa-201311-17.xml
@@ -6,8 +6,8 @@
could allow a local attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">perl</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>249629</bug>
<bug>313565</bug>
<bug>362025</bug>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5302">CVE-2008-5302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5303">CVE-2008-5303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1158">CVE-2010-1158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0761">CVE-2011-0761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1487">CVE-2011-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5302">CVE-2008-5302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5303">CVE-2008-5303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1158">CVE-2010-1158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0761">CVE-2011-0761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1487">CVE-2011-1487</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:30 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:30Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:07 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:07Z">craig</metadata>
</glsa>
diff --git a/glsa-201311-18.xml b/glsa-201311-18.xml
index b31f798a..9bbaea6f 100644
--- a/glsa-201311-18.xml
+++ b/glsa-201311-18.xml
@@ -6,8 +6,8 @@
Unbound.
</synopsis>
<product type="ebuild">unbound</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>395287</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4528">CVE-2011-4528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4869">CVE-2011-4869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4528">CVE-2011-4528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4869">CVE-2011-4869</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:21:57 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:29 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:21:57Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:29Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-19.xml b/glsa-201311-19.xml
index 2ed9ff87..e5c05c78 100644
--- a/glsa-201311-19.xml
+++ b/glsa-201311-19.xml
@@ -6,8 +6,8 @@
attackers to bypass access restrictions.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>415255</bug>
<bug>445166</bug>
<access>local</access>
@@ -47,17 +47,17 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2252">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2252">
CVE-2012-2252
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3478">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3478">
CVE-2012-3478
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Aug 2012 14:16:31 +0000">
+ <metadata tag="requester" timestamp="2012-08-24T14:16:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:46 +0000">
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201311-20.xml b/glsa-201311-20.xml
index ab99d089..ef6e7803 100644
--- a/glsa-201311-20.xml
+++ b/glsa-201311-20.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">okular</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>334469</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2575">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2575">
CVE-2010-2575
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:53 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:53Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:19:02 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:19:02Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-21.xml b/glsa-201311-21.xml
index 743371bf..c54c4a86 100644
--- a/glsa-201311-21.xml
+++ b/glsa-201311-21.xml
@@ -6,8 +6,8 @@
server to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>314663</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624">
CVE-2010-0624
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:19:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:19:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201311-22.xml b/glsa-201311-22.xml
index a12ddb02..d2ed33c7 100644
--- a/glsa-201311-22.xml
+++ b/glsa-201311-22.xml
@@ -6,8 +6,8 @@
allows remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">namazu</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>391259</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5028">CVE-2009-5028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4345">CVE-2011-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4711">CVE-2011-4711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5028">CVE-2009-5028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4345">CVE-2011-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4711">CVE-2011-4711</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:13:31 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 09:20:14 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:13:31Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T09:20:14Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-01.xml b/glsa-201312-01.xml
index 250799d5..ca5f01e8 100644
--- a/glsa-201312-01.xml
+++ b/glsa-201312-01.xml
@@ -6,8 +6,8 @@
worst of which allowing arbitrary code execution and privilege escalation.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>350744</bug>
<bug>356567</bug>
<bug>386323</bug>
@@ -58,20 +58,20 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5029">CVE-2009-5029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3847">CVE-2010-3847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0536">CVE-2011-0536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071">CVE-2011-1071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1089">CVE-2011-1089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1095">CVE-2011-1095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1658">CVE-2011-1658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1659">CVE-2011-1659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0864">CVE-2012-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5029">CVE-2009-5029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3847">CVE-2010-3847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0536">CVE-2011-0536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071">CVE-2011-1071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1089">CVE-2011-1089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1095">CVE-2011-1095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1658">CVE-2011-1658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1659">CVE-2011-1659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0864">CVE-2012-0864</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Aug 2012 04:55:03 +0000">
+ <metadata tag="requester" timestamp="2012-08-16T04:55:03Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 03:49:15 +0000">
+ <metadata tag="submitter" timestamp="2013-12-03T03:49:15Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/glsa-201312-02.xml b/glsa-201312-02.xml
index 22d8f0ab..0232ed7f 100644
--- a/glsa-201312-02.xml
+++ b/glsa-201312-02.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>379857</bug>
<bug>426504</bug>
<bug>461372</bug>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-1168">CVE-2006-1168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2716">CVE-2011-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1813">CVE-2013-1813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-1168">CVE-2006-1168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2716">CVE-2011-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1813">CVE-2013-1813</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 03:51:08 +0000">
+ <metadata tag="submitter" timestamp="2013-12-03T03:51:08Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201312-03.xml b/glsa-201312-03.xml
index de23f65c..ce8f08d0 100644
--- a/glsa-201312-03.xml
+++ b/glsa-201312-03.xml
@@ -6,8 +6,8 @@
attackers to determine private keys or cause a Denial of Service.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>December 03, 2013</announced>
- <revised>June 06, 2015: 5</revised>
+ <announced>2013-12-03</announced>
+ <revised>2015-06-06: 5</revised>
<bug>369753</bug>
<bug>406199</bug>
<bug>412643</bug>
@@ -72,18 +72,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7250">CVE-2006-7250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1945">CVE-2011-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0884">CVE-2012-0884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1165">CVE-2012-1165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2110">CVE-2012-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2333">CVE-2012-2333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2686">CVE-2012-2686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0166">CVE-2013-0166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7250">CVE-2006-7250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1945">CVE-2011-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0884">CVE-2012-0884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1165">CVE-2012-1165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2110">CVE-2012-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2333">CVE-2012-2333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2686">CVE-2012-2686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0166">CVE-2013-0166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Mar 2012 02:30:07 +0000">
+ <metadata tag="requester" timestamp="2012-03-15T02:30:07Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:09:51 +0000">n0idx80</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:09:51Z">n0idx80</metadata>
</glsa>
diff --git a/glsa-201312-04.xml b/glsa-201312-04.xml
index 28ed5683..af6bced0 100644
--- a/glsa-201312-04.xml
+++ b/glsa-201312-04.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libtheora</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>298039</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3389">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3389">
CVE-2009-3389
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:01Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 04:32:42 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-03T04:32:42Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-05.xml b/glsa-201312-05.xml
index e0be095e..660a36f4 100644
--- a/glsa-201312-05.xml
+++ b/glsa-201312-05.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">swi-prolog</product>
- <announced>December 06, 2013</announced>
- <revised>December 06, 2013: 1</revised>
+ <announced>2013-12-06</announced>
+ <revised>2013-12-06: 1</revised>
<bug>450284</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6089">CVE-2012-6089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6090">CVE-2012-6090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6089">CVE-2012-6089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6090">CVE-2012-6090</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Jan 2013 22:27:33 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Dec 2013 05:30:38 +0000">
+ <metadata tag="requester" timestamp="2013-01-21T22:27:33Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-06T05:30:38Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201312-06.xml b/glsa-201312-06.xml
index af2d0d1b..341a6112 100644
--- a/glsa-201312-06.xml
+++ b/glsa-201312-06.xml
@@ -6,8 +6,8 @@
execution, and privilege escalation.
</synopsis>
<product type="ebuild">festival</product>
- <announced>December 09, 2013</announced>
- <revised>December 09, 2013: 1</revised>
+ <announced>2013-12-09</announced>
+ <revised>2013-12-09: 1</revised>
<bug>386319</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3996">CVE-2010-3996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3996">CVE-2010-3996</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2012 22:54:17 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Dec 2013 05:41:22 +0000">
+ <metadata tag="requester" timestamp="2012-12-04T22:54:17Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-09T05:41:22Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201312-07.xml b/glsa-201312-07.xml
index 1ebc52bc..63701d3f 100644
--- a/glsa-201312-07.xml
+++ b/glsa-201312-07.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">openexr</product>
- <announced>December 09, 2013</announced>
- <revised>December 09, 2013: 1</revised>
+ <announced>2013-12-09</announced>
+ <revised>2013-12-09: 1</revised>
<bug>277202</bug>
<access>local, remote</access>
<affected>
@@ -53,15 +53,15 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1720">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1720">
CVE-2009-1720
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1721">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1721">
CVE-2009-1721
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Dec 2013 05:43:34 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-09T05:43:34Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-08.xml b/glsa-201312-08.xml
index 12140956..e1897bb1 100644
--- a/glsa-201312-08.xml
+++ b/glsa-201312-08.xml
@@ -6,8 +6,8 @@
code execution or Denial of Service.
</synopsis>
<product type="ebuild">libwebp</product>
- <announced>December 10, 2013</announced>
- <revised>December 10, 2013: 1</revised>
+ <announced>2013-12-10</announced>
+ <revised>2013-12-10: 1</revised>
<bug>442152</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Nov 2012 01:29:46 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Dec 2013 07:54:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-26T01:29:46Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-10T07:54:19Z">ackle</metadata>
</glsa>
diff --git a/glsa-201312-09.xml b/glsa-201312-09.xml
index 1645a9fc..04126873 100644
--- a/glsa-201312-09.xml
+++ b/glsa-201312-09.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">cabextract</product>
- <announced>December 14, 2013</announced>
- <revised>December 14, 2013: 1</revised>
+ <announced>2013-12-14</announced>
+ <revised>2013-12-14: 1</revised>
<bug>329891</bug>
<access>remote</access>
<affected>
@@ -48,15 +48,15 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2800">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2800">
CVE-2010-2800
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2801">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2801">
CVE-2010-2801
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:14 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Dec 2013 22:24:14 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-14T22:24:14Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-10.xml b/glsa-201312-10.xml
index 2c9415c1..e0a4f212 100644
--- a/glsa-201312-10.xml
+++ b/glsa-201312-10.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">libsmi</product>
- <announced>December 14, 2013</announced>
- <revised>December 14, 2013: 1</revised>
+ <announced>2013-12-14</announced>
+ <revised>2013-12-14: 1</revised>
<bug>342127</bug>
<access>local, remote</access>
<affected>
@@ -52,10 +52,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2891">CVE-2010-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2891">CVE-2010-2891</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Dec 2013 22:33:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-14T22:33:15Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-11.xml b/glsa-201312-11.xml
index 32601300..945fb921 100644
--- a/glsa-201312-11.xml
+++ b/glsa-201312-11.xml
@@ -6,8 +6,8 @@
allow for user-assisted arbitrary code execution.
</synopsis>
<product type="ebuild">win32codecs</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>232999</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5400">CVE-2007-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5400">CVE-2007-5400</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 01:23:33 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T01:23:33Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 12:38:30 +0000">
+ <metadata tag="submitter" timestamp="2013-12-16T12:38:30Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201312-12.xml b/glsa-201312-12.xml
index 302ba43a..84b05b8b 100644
--- a/glsa-201312-12.xml
+++ b/glsa-201312-12.xml
@@ -6,8 +6,8 @@
allowing execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>429324</bug>
<bug>466268</bug>
<bug>469752</bug>
@@ -53,14 +53,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2002-2443">CVE-2002-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1014">CVE-2012-1014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1015">CVE-2012-1015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1416">CVE-2013-1416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1417">CVE-2013-1417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1418">CVE-2013-1418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6800">CVE-2013-6800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2002-2443">CVE-2002-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1014">CVE-2012-1014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1015">CVE-2012-1015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1416">CVE-2013-1416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1417">CVE-2013-1417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1418">CVE-2013-1418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6800">CVE-2013-6800</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 15:10:58 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 17:33:09 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T15:10:58Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-16T17:33:09Z">ackle</metadata>
</glsa>
diff --git a/glsa-201312-13.xml b/glsa-201312-13.xml
index ee088cb1..4ef2503a 100644
--- a/glsa-201312-13.xml
+++ b/glsa-201312-13.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>484582</bug>
<bug>490434</bug>
<access>remote</access>
@@ -50,18 +50,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5717">CVE-2013-5717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5718">CVE-2013-5718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5719">CVE-2013-5719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5720">CVE-2013-5720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5721">CVE-2013-5721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5722">CVE-2013-5722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6336">CVE-2013-6336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6337">CVE-2013-6337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6338">CVE-2013-6338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6339">CVE-2013-6339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6340">CVE-2013-6340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5717">CVE-2013-5717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5718">CVE-2013-5718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5719">CVE-2013-5719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5720">CVE-2013-5720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5721">CVE-2013-5721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5722">CVE-2013-5722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6336">CVE-2013-6336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6337">CVE-2013-6337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6338">CVE-2013-6338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6339">CVE-2013-6339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6340">CVE-2013-6340</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:34:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 18:13:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:34:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-16T18:13:16Z">ackle</metadata>
</glsa>
diff --git a/glsa-201312-14.xml b/glsa-201312-14.xml
index 3663ef5a..ba386106 100644
--- a/glsa-201312-14.xml
+++ b/glsa-201312-14.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>December 17, 2013</announced>
- <revised>December 17, 2013: 1</revised>
+ <announced>2013-12-17</announced>
+ <revised>2013-12-17: 1</revised>
<bug>375125</bug>
<access>remote</access>
<affected>
@@ -51,10 +51,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2696">CVE-2011-2696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2696">CVE-2011-2696</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:34 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:34Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Dec 2013 11:38:44 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-17T11:38:44Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201312-15.xml b/glsa-201312-15.xml
index 7ee57881..0b3dff97 100644
--- a/glsa-201312-15.xml
+++ b/glsa-201312-15.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tinyproxy</product>
- <announced>December 23, 2013</announced>
- <revised>December 23, 2013: 1</revised>
+ <announced>2013-12-23</announced>
+ <revised>2013-12-23: 1</revised>
<bug>432046</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3505">CVE-2012-3505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3505">CVE-2012-3505</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 03:12:39 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T03:12:39Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Dec 2013 17:53:38 +0000">
+ <metadata tag="submitter" timestamp="2013-12-23T17:53:38Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201312-16.xml b/glsa-201312-16.xml
index 53e22650..2a375121 100644
--- a/glsa-201312-16.xml
+++ b/glsa-201312-16.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">xfig</product>
- <announced>December 27, 2013</announced>
- <revised>December 27, 2013: 1</revised>
+ <announced>2013-12-27</announced>
+ <revised>2013-12-27: 1</revised>
<bug>348344</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4262">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4262">
CVE-2010-4262
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:54 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Dec 2013 17:20:28 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:54Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-12-27T17:20:28Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-01.xml b/glsa-201401-01.xml
index 6191c04e..99dbaab2 100644
--- a/glsa-201401-01.xml
+++ b/glsa-201401-01.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libgdiplus</product>
- <announced>January 05, 2014</announced>
- <revised>January 05, 2014: 1</revised>
+ <announced>2014-01-05</announced>
+ <revised>2014-01-05: 1</revised>
<bug>334101</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1526">CVE-2010-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1526">CVE-2010-1526</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jan 2014 00:05:05 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-05T00:05:05Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-02.xml b/glsa-201401-02.xml
index 942b6f06..4e12746b 100644
--- a/glsa-201401-02.xml
+++ b/glsa-201401-02.xml
@@ -6,8 +6,8 @@
accepted as valid.
</synopsis>
<product type="ebuild">gajim</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 1</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 1</revised>
<bug>442860</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5524">CVE-2012-5524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5524">CVE-2012-5524</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 01:48:29 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T01:48:29Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 19:16:07 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T19:16:07Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-03.xml b/glsa-201401-03.xml
index a79a024e..da7c7423 100644
--- a/glsa-201401-03.xml
+++ b/glsa-201401-03.xml
@@ -6,8 +6,8 @@
remote attacker.
</synopsis>
<product type="ebuild">nagstamon</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 2</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 2</revised>
<bug>476538</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4114">CVE-2013-4114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4114">CVE-2013-4114</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 22:22:38 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T22:22:38Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-04.xml b/glsa-201401-04.xml
index a7d5e69f..6b6390be 100644
--- a/glsa-201401-04.xml
+++ b/glsa-201401-04.xml
@@ -6,8 +6,8 @@
which allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">python</product>
- <announced>January 06, 2014</announced>
- <revised>June 17, 2015: 5</revised>
+ <announced>2014-01-06</announced>
+ <revised>2015-06-17: 5</revised>
<bug>325593</bug>
<bug>355927</bug>
<bug>358663</bug>
@@ -85,19 +85,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1634">CVE-2010-1634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2089">CVE-2010-2089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3492">CVE-2010-3492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3493">CVE-2010-3493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1015">CVE-2011-1015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0845">CVE-2012-0845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1150">CVE-2012-1150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2099">CVE-2013-2099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1634">CVE-2010-1634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2089">CVE-2010-2089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3492">CVE-2010-3492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3493">CVE-2010-3493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1015">CVE-2011-1015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0845">CVE-2012-0845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1150">CVE-2012-1150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2099">CVE-2013-2099</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Sep 2013 03:32:23 +0000">
+ <metadata tag="requester" timestamp="2013-09-18T03:32:23Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Jun 2015 19:34:44 +0000">
+ <metadata tag="submitter" timestamp="2015-06-17T19:34:44Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-05.xml b/glsa-201401-05.xml
index a54a6f31..1a3a6b72 100644
--- a/glsa-201401-05.xml
+++ b/glsa-201401-05.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 1</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 1</revised>
<bug>463848</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2494">CVE-2013-2494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2494">CVE-2013-2494</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Sep 2013 16:23:20 +0000">
+ <metadata tag="requester" timestamp="2013-09-03T16:23:20Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 21:52:49 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T21:52:49Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-06.xml b/glsa-201401-06.xml
index 82d697f2..bc524ec3 100644
--- a/glsa-201401-06.xml
+++ b/glsa-201401-06.xml
@@ -6,8 +6,8 @@
to gain escalated privileges.
</synopsis>
<product type="ebuild">git </product>
- <announced>January 10, 2014</announced>
- <revised>January 10, 2014: 1</revised>
+ <announced>2014-01-10</announced>
+ <revised>2014-01-10: 1</revised>
<bug>335891</bug>
<access>local</access>
<affected>
@@ -50,10 +50,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2542">CVE-2010-2542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2542">CVE-2010-2542</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:23 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:23Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jan 2014 13:31:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-10T13:31:29Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-07.xml b/glsa-201401-07.xml
index 905d929f..839d47d4 100644
--- a/glsa-201401-07.xml
+++ b/glsa-201401-07.xml
@@ -6,8 +6,8 @@
libxslt.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>January 10, 2014</announced>
- <revised>January 10, 2014: 1</revised>
+ <announced>2014-01-10</announced>
+ <revised>2014-01-10: 1</revised>
<bug>433603</bug>
<bug>436284</bug>
<bug>463236</bug>
@@ -58,11 +58,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2870">CVE-2012-2870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2893">CVE-2012-2893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139">CVE-2012-6139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4520">CVE-2013-4520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2870">CVE-2012-2870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2893">CVE-2012-2893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139">CVE-2012-6139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4520">CVE-2013-4520</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2012 01:49:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jan 2014 14:13:14 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-30T01:49:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-10T14:13:14Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-08.xml b/glsa-201401-08.xml
index a9a6b5c1..b60322e8 100644
--- a/glsa-201401-08.xml
+++ b/glsa-201401-08.xml
@@ -3,9 +3,9 @@
<glsa id="201401-08">
<title>NTP: Traffic amplification</title>
<synopsis>NTP can be abused to amplify Denial of Service attack traffic.</synopsis>
- <product type="ebuild"></product>
- <announced>January 16, 2014</announced>
- <revised>January 16, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-01-16</announced>
+ <revised>2014-01-16: 1</revised>
<bug>496776</bug>
<access>remote</access>
<affected>
@@ -59,13 +59,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5211">CVE-2013-5211</uri>
- <uri link="http://www.kb.cert.org/vuls/id/348126">VU#348126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5211">CVE-2013-5211</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/348126">VU#348126</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jan 2014 20:55:36 +0000">
+ <metadata tag="requester" timestamp="2014-01-16T20:55:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jan 2014 22:31:29 +0000">
+ <metadata tag="submitter" timestamp="2014-01-16T22:31:29Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201401-09.xml b/glsa-201401-09.xml
index 5587a345..73332b64 100644
--- a/glsa-201401-09.xml
+++ b/glsa-201401-09.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>January 18, 2014</announced>
- <revised>January 18, 2014: 1</revised>
+ <announced>2014-01-18</announced>
+ <revised>2014-01-18: 1</revised>
<bug>483204</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2053">CVE-2013-2053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2053">CVE-2013-2053</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Sep 2013 18:39:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jan 2014 20:05:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-01T18:39:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-18T20:05:02Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-10.xml b/glsa-201401-10.xml
index 41768ef2..8e41bd04 100644
--- a/glsa-201401-10.xml
+++ b/glsa-201401-10.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>January 19, 2014</announced>
- <revised>January 19, 2014: 1</revised>
+ <announced>2014-01-19</announced>
+ <revised>2014-01-19: 1</revised>
<bug>426366</bug>
<access>remote</access>
<affected>
@@ -61,15 +61,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2812">CVE-2012-2812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2813">CVE-2012-2813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2814">CVE-2012-2814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2836">CVE-2012-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2837">CVE-2012-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2840">CVE-2012-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2841">CVE-2012-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2845">CVE-2012-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2812">CVE-2012-2812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2813">CVE-2012-2813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2814">CVE-2012-2814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2836">CVE-2012-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2837">CVE-2012-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2840">CVE-2012-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2841">CVE-2012-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2845">CVE-2012-2845</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 17:42:17 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jan 2014 15:10:21 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T17:42:17Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-19T15:10:21Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-11.xml b/glsa-201401-11.xml
index c5dc9cae..21457d32 100644
--- a/glsa-201401-11.xml
+++ b/glsa-201401-11.xml
@@ -7,8 +7,8 @@
context-dependent attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">perl</product>
- <announced>January 19, 2014</announced>
- <revised>January 19, 2014: 1</revised>
+ <announced>2014-01-19</announced>
+ <revised>2014-01-19: 1</revised>
<bug>384887</bug>
<bug>448632</bug>
<bug>460444</bug>
@@ -60,12 +60,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2728">CVE-2011-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2939">CVE-2011-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5195">CVE-2012-5195
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2728">CVE-2011-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2939">CVE-2011-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5195">CVE-2012-5195
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1667">CVE-2013-1667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1667">CVE-2013-1667</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Dec 2013 14:48:00 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jan 2014 16:14:53 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-12-19T14:48:00Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-19T16:14:53Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-12.xml b/glsa-201401-12.xml
index 5149c1f3..d227762a 100644
--- a/glsa-201401-12.xml
+++ b/glsa-201401-12.xml
@@ -6,8 +6,8 @@
the worst of which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gnustep-base</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>325577</bug>
<access>local, remote</access>
<affected>
@@ -53,11 +53,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1457">CVE-2010-1457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1620">CVE-2010-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1457">CVE-2010-1457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1620">CVE-2010-1620</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:30 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:30Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 08:51:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T08:51:59Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-13.xml b/glsa-201401-13.xml
index 9096c62f..394b2df7 100644
--- a/glsa-201401-13.xml
+++ b/glsa-201401-13.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>434872</bug>
<bug>498166</bug>
<access>local</access>
@@ -56,15 +56,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3221">CVE-2012-3221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5892">CVE-2013-5892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0404">CVE-2014-0404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0405">CVE-2014-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0406">CVE-2014-0406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0407">CVE-2014-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3221">CVE-2012-3221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5892">CVE-2013-5892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0404">CVE-2014-0404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0405">CVE-2014-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0406">CVE-2014-0406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0407">CVE-2014-0407</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 23:38:57 +0000">
+ <metadata tag="requester" timestamp="2012-09-20T23:38:57Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 08:52:54 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T08:52:54Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-14.xml b/glsa-201401-14.xml
index 12461391..d6df9702 100644
--- a/glsa-201401-14.xml
+++ b/glsa-201401-14.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">curl</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>456074</bug>
<bug>465678</bug>
<bug>474354</bug>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0249">CVE-2013-0249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1944">CVE-2013-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2174">CVE-2013-2174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6422">CVE-2013-6422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0249">CVE-2013-0249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1944">CVE-2013-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2174">CVE-2013-2174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6422">CVE-2013-6422</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 19:39:59 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 14:02:23 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T19:39:59Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T14:02:23Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-15.xml b/glsa-201401-15.xml
index f3ad69bf..e52280e3 100644
--- a/glsa-201401-15.xml
+++ b/glsa-201401-15.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>449828</bug>
<bug>463622</bug>
<bug>482776</bug>
@@ -54,17 +54,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5976">CVE-2012-5976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5977">CVE-2012-5977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2264">CVE-2013-2264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2685">CVE-2013-2685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2686">CVE-2013-2686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5641">CVE-2013-5641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5642">CVE-2013-5642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7100">CVE-2013-7100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5976">CVE-2012-5976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5977">CVE-2012-5977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2264">CVE-2013-2264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2685">CVE-2013-2685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2686">CVE-2013-2686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5641">CVE-2013-5641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5642">CVE-2013-5642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7100">CVE-2013-7100</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Jan 2013 17:20:14 +0000">
+ <metadata tag="requester" timestamp="2013-01-03T17:20:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 04:17:25 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T04:17:25Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-16.xml b/glsa-201401-16.xml
index 3abef043..9bdc926b 100644
--- a/glsa-201401-16.xml
+++ b/glsa-201401-16.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">ccid</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349559</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4530">CVE-2010-4530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4530">CVE-2010-4530</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:18 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:18Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 17:22:43 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T17:22:43Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-17.xml b/glsa-201401-17.xml
index 7dbf850f..e9bcfb13 100644
--- a/glsa-201401-17.xml
+++ b/glsa-201401-17.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">pcsc-lite</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349561</bug>
<access>local</access>
<affected>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4531">CVE-2010-4531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4531">CVE-2010-4531</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:57 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:57Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 17:31:07 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T17:31:07Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-18.xml b/glsa-201401-18.xml
index 2d6fd134..98d03fa3 100644
--- a/glsa-201401-18.xml
+++ b/glsa-201401-18.xml
@@ -6,8 +6,8 @@
allowing attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349567</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4523">CVE-2010-4523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4523">CVE-2010-4523</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:47 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:47Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 18:48:55 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T18:48:55Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-19.xml b/glsa-201401-19.xml
index bbc0a8d1..fc8d2f5e 100644
--- a/glsa-201401-19.xml
+++ b/glsa-201401-19.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">gmime</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>308051</bug>
<access>local, remote</access>
<affected>
@@ -67,12 +67,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0409">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0409">
CVE-2010-0409
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:54 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:54Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:00:40 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:00:40Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-20.xml b/glsa-201401-20.xml
index 15ffac9f..0c6dfbd1 100644
--- a/glsa-201401-20.xml
+++ b/glsa-201401-20.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or perform XSS attacks.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>324031</bug>
<bug>480196</bug>
<access>remote</access>
@@ -45,29 +45,29 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1644">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1644">
CVE-2010-1644
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1645">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1645">
CVE-2010-1645
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2092">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2092">
CVE-2010-2092
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2543">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2543">
CVE-2010-2543
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2544">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2544">
CVE-2010-2544
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2545">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2545">
CVE-2010-2545
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1434">CVE-2013-1434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1435">CVE-2013-1435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1434">CVE-2013-1434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1435">CVE-2013-1435</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:37 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:37Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:02:25 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:02:25Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-21.xml b/glsa-201401-21.xml
index 883af072..520d5596 100644
--- a/glsa-201401-21.xml
+++ b/glsa-201401-21.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>489720</bug>
<bug>496770</bug>
<access>remote</access>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4473">CVE-2013-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4474">CVE-2013-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7296">CVE-2013-7296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4473">CVE-2013-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4474">CVE-2013-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7296">CVE-2013-7296</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Dec 2013 17:04:54 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:03:29 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-12-17T17:04:54Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:03:29Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-22.xml b/glsa-201401-22.xml
index 31b0de26..2564bc08 100644
--- a/glsa-201401-22.xml
+++ b/glsa-201401-22.xml
@@ -6,8 +6,8 @@
inject SQL commands.
</synopsis>
<product type="ebuild">activerecord</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>449826</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6496">CVE-2012-6496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6496">CVE-2012-6496</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 02:08:41 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T02:08:41Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:21:31 +0000">
+ <metadata tag="submitter" timestamp="2014-01-21T20:21:31Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-23.xml b/glsa-201401-23.xml
index b7f45bd0..dd98240b 100644
--- a/glsa-201401-23.xml
+++ b/glsa-201401-23.xml
@@ -6,8 +6,8 @@
in privilege escalation.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>459722</bug>
<access>local</access>
<affected>
@@ -54,13 +54,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1775">CVE-2013-1775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1776">CVE-2013-1776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2776">CVE-2013-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2777">CVE-2013-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1775">CVE-2013-1775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1776">CVE-2013-1776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2776">CVE-2013-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2777">CVE-2013-2777</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Jan 2014 14:24:36 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:25:34 +0000">
+ <metadata tag="requester" timestamp="2014-01-03T14:24:36Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:25:34Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-24.xml b/glsa-201401-24.xml
index ed3b8529..0c447d6e 100644
--- a/glsa-201401-24.xml
+++ b/glsa-201401-24.xml
@@ -6,8 +6,8 @@
remote attacker to conduct a man-in-the-middle attack.
</synopsis>
<product type="ebuild">inn</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>432002</bug>
<access>remote</access>
<affected>
@@ -38,10 +38,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3523">CVE-2012-3523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3523">CVE-2012-3523</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:56:39 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:26:02 +0000">
+ <metadata tag="requester" timestamp="2012-12-16T21:56:39Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:26:02Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201401-25.xml b/glsa-201401-25.xml
index fd83c237..1a329567 100644
--- a/glsa-201401-25.xml
+++ b/glsa-201401-25.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">ldns</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>384249</bug>
<access>remote</access>
<affected>
@@ -53,10 +53,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3581">CVE-2011-3581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3581">CVE-2011-3581</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:44:51 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:44:51Z">craig</metadata>
</glsa>
diff --git a/glsa-201401-26.xml b/glsa-201401-26.xml
index bf229bd4..cf0f14a6 100644
--- a/glsa-201401-26.xml
+++ b/glsa-201401-26.xml
@@ -6,8 +6,8 @@
arbitrary shell code.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>January 23, 2014</announced>
- <revised>June 02, 2014: 2</revised>
+ <announced>2014-01-23</announced>
+ <revised>2014-06-02: 2</revised>
<bug>493250</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6824">CVE-2013-6824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6824">CVE-2013-6824</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Dec 2013 19:46:48 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jun 2014 13:59:58 +0000">
+ <metadata tag="requester" timestamp="2013-12-17T19:46:48Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-02T13:59:58Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201401-27.xml b/glsa-201401-27.xml
index ef1a4018..fbf68911 100644
--- a/glsa-201401-27.xml
+++ b/glsa-201401-27.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">texmacs</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 2</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 2</revised>
<bug>337532</bug>
<access>local</access>
<affected>
@@ -51,12 +51,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3394">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3394">
CVE-2010-3394
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 00:54:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T00:54:29Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-28.xml b/glsa-201401-28.xml
index eaf0e21f..dc443ab2 100644
--- a/glsa-201401-28.xml
+++ b/glsa-201401-28.xml
@@ -4,8 +4,8 @@
<title>Tomboy: Privilege escalation</title>
<synopsis>A vulnerability in Tomboy could result in privilege escalation.</synopsis>
<product type="ebuild">tomboy</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 1</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 1</revised>
<bug>356583</bug>
<access>local</access>
<affected>
@@ -50,13 +50,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005">CVE-2010-4005</uri>
- <uri link="http://www.gentoo.org/security/en/glsa/glsa-200711-12.xml">GLSA
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005">CVE-2010-4005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-12.xml">GLSA
200711-12
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 01:22:06 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T01:22:06Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-29.xml b/glsa-201401-29.xml
index f9227f6b..61e1a6b1 100644
--- a/glsa-201401-29.xml
+++ b/glsa-201401-29.xml
@@ -4,8 +4,8 @@
<title>VIPS: Privilege Escalation</title>
<synopsis>A vulnerability in VIPS could result in privilege escalation.</synopsis>
<product type="ebuild">vips</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 1</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 1</revised>
<bug>344561</bug>
<access>local</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3364">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3364">
CVE-2010-3364
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 19:04:41 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T19:04:41Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-30.xml b/glsa-201401-30.xml
index cf7492b9..7c2922bb 100644
--- a/glsa-201401-30.xml
+++ b/glsa-201401-30.xml
@@ -8,8 +8,8 @@
<product type="ebuild">sun-jre-bin sun-jdk oracle-jdk-bin oracle-jre-bin
emul-linux-x86-java
</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 1</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 1</revised>
<bug>404071</bug>
<bug>421073</bug>
<bug>433094</bug>
@@ -105,258 +105,258 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0498">CVE-2012-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0499">CVE-2012-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0500">CVE-2012-0500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0504">CVE-2012-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0507">CVE-2012-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1531">CVE-2012-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1532">CVE-2012-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1533">CVE-2012-1533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1541">CVE-2012-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1682">CVE-2012-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1721">CVE-2012-1721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1722">CVE-2012-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3136">CVE-2012-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3143">CVE-2012-3143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3159">CVE-2012-3159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3174">CVE-2012-3174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3213">CVE-2012-3213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3342">CVE-2012-3342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4681">CVE-2012-4681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5067">CVE-2012-5067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5079">CVE-2012-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5083">CVE-2012-5083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5088">CVE-2012-5088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0351">CVE-2013-0351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0402">CVE-2013-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0409">CVE-2013-0409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0419">CVE-2013-0419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0422">CVE-2013-0422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0423">CVE-2013-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0430">CVE-2013-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0437">CVE-2013-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0438">CVE-2013-0438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0445">CVE-2013-0445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0446">CVE-2013-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0448">CVE-2013-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0449">CVE-2013-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1473">CVE-2013-1473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1479">CVE-2013-1479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1481">CVE-2013-1481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1487">CVE-2013-1487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1491">CVE-2013-1491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1540">CVE-2013-1540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1558">CVE-2013-1558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1561">CVE-2013-1561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1563">CVE-2013-1563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1564">CVE-2013-1564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2394">CVE-2013-2394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2400">CVE-2013-2400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2414">CVE-2013-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2416">CVE-2013-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2418">CVE-2013-2418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2425">CVE-2013-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2427">CVE-2013-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2428">CVE-2013-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2432">CVE-2013-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2433">CVE-2013-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2434">CVE-2013-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2435">CVE-2013-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2437">CVE-2013-2437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2438">CVE-2013-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2439">CVE-2013-2439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2440">CVE-2013-2440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2442">CVE-2013-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2462">CVE-2013-2462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2464">CVE-2013-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2466">CVE-2013-2466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2467">CVE-2013-2467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2468">CVE-2013-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3743">CVE-2013-3743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3744">CVE-2013-3744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5775">CVE-2013-5775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5776">CVE-2013-5776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5777">CVE-2013-5777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5787">CVE-2013-5787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5788">CVE-2013-5788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5789">CVE-2013-5789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5801">CVE-2013-5801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5810">CVE-2013-5810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5812">CVE-2013-5812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5818">CVE-2013-5818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5819">CVE-2013-5819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5824">CVE-2013-5824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5831">CVE-2013-5831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5832">CVE-2013-5832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5838">CVE-2013-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5843">CVE-2013-5843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5844">CVE-2013-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5846">CVE-2013-5846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5848">CVE-2013-5848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5852">CVE-2013-5852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5854">CVE-2013-5854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5870">CVE-2013-5870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5878">CVE-2013-5878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5887">CVE-2013-5887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5888">CVE-2013-5888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5889">CVE-2013-5889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5893">CVE-2013-5893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5895">CVE-2013-5895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5896">CVE-2013-5896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5898">CVE-2013-5898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5899">CVE-2013-5899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5902">CVE-2013-5902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5904">CVE-2013-5904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5905">CVE-2013-5905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5906">CVE-2013-5906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5907">CVE-2013-5907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5910">CVE-2013-5910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0368">CVE-2014-0368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0373">CVE-2014-0373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0375">CVE-2014-0375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0376">CVE-2014-0376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0382">CVE-2014-0382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0385">CVE-2014-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0387">CVE-2014-0387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0403">CVE-2014-0403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0408">CVE-2014-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0410">CVE-2014-0410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0411">CVE-2014-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0415">CVE-2014-0415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0416">CVE-2014-0416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0417">CVE-2014-0417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0418">CVE-2014-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0422">CVE-2014-0422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0423">CVE-2014-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0424">CVE-2014-0424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0428">CVE-2014-0428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0498">CVE-2012-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0499">CVE-2012-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0500">CVE-2012-0500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0504">CVE-2012-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0507">CVE-2012-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1531">CVE-2012-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1532">CVE-2012-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1533">CVE-2012-1533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1541">CVE-2012-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1682">CVE-2012-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1721">CVE-2012-1721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1722">CVE-2012-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3136">CVE-2012-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3143">CVE-2012-3143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3159">CVE-2012-3159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3174">CVE-2012-3174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3213">CVE-2012-3213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3342">CVE-2012-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4681">CVE-2012-4681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5067">CVE-2012-5067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5079">CVE-2012-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5083">CVE-2012-5083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5088">CVE-2012-5088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0351">CVE-2013-0351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0402">CVE-2013-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0409">CVE-2013-0409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0419">CVE-2013-0419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0422">CVE-2013-0422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0423">CVE-2013-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0430">CVE-2013-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0437">CVE-2013-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0438">CVE-2013-0438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0445">CVE-2013-0445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0446">CVE-2013-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0448">CVE-2013-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0449">CVE-2013-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1473">CVE-2013-1473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1479">CVE-2013-1479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1481">CVE-2013-1481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1487">CVE-2013-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1491">CVE-2013-1491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1540">CVE-2013-1540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1558">CVE-2013-1558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1561">CVE-2013-1561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1563">CVE-2013-1563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1564">CVE-2013-1564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2394">CVE-2013-2394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2400">CVE-2013-2400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2414">CVE-2013-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2416">CVE-2013-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2418">CVE-2013-2418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2425">CVE-2013-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2427">CVE-2013-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2428">CVE-2013-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2432">CVE-2013-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2433">CVE-2013-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2434">CVE-2013-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2435">CVE-2013-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2437">CVE-2013-2437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2438">CVE-2013-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2439">CVE-2013-2439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2440">CVE-2013-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2442">CVE-2013-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2462">CVE-2013-2462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2464">CVE-2013-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2466">CVE-2013-2466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2467">CVE-2013-2467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2468">CVE-2013-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3743">CVE-2013-3743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3744">CVE-2013-3744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5775">CVE-2013-5775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5776">CVE-2013-5776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5777">CVE-2013-5777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5787">CVE-2013-5787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5788">CVE-2013-5788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5789">CVE-2013-5789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5801">CVE-2013-5801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5810">CVE-2013-5810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5812">CVE-2013-5812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5818">CVE-2013-5818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5819">CVE-2013-5819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5824">CVE-2013-5824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5831">CVE-2013-5831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5832">CVE-2013-5832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5838">CVE-2013-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5843">CVE-2013-5843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5844">CVE-2013-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5846">CVE-2013-5846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5848">CVE-2013-5848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5852">CVE-2013-5852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5854">CVE-2013-5854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5870">CVE-2013-5870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5878">CVE-2013-5878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5887">CVE-2013-5887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5888">CVE-2013-5888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5889">CVE-2013-5889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5893">CVE-2013-5893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5895">CVE-2013-5895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5896">CVE-2013-5896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5898">CVE-2013-5898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5899">CVE-2013-5899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5902">CVE-2013-5902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5904">CVE-2013-5904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5905">CVE-2013-5905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5906">CVE-2013-5906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5907">CVE-2013-5907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5910">CVE-2013-5910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0368">CVE-2014-0368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0373">CVE-2014-0373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0375">CVE-2014-0375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0376">CVE-2014-0376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0382">CVE-2014-0382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0385">CVE-2014-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0387">CVE-2014-0387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0403">CVE-2014-0403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0408">CVE-2014-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0410">CVE-2014-0410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0411">CVE-2014-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0415">CVE-2014-0415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0416">CVE-2014-0416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0417">CVE-2014-0417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0418">CVE-2014-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0422">CVE-2014-0422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0423">CVE-2014-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0424">CVE-2014-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0428">CVE-2014-0428</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Feb 2012 21:32:37 +0000">
+ <metadata tag="requester" timestamp="2012-02-18T21:32:37Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 01:17:59 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T01:17:59Z">ackle</metadata>
</glsa>
diff --git a/glsa-201401-31.xml b/glsa-201401-31.xml
index e50e4f05..d764b99c 100644
--- a/glsa-201401-31.xml
+++ b/glsa-201401-31.xml
@@ -4,8 +4,8 @@
<title>CEDET: Privilege escalation</title>
<synopsis>A vulnerability in CEDET could result in privilege escalation.</synopsis>
<product type="ebuild">cedet</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 2</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 2</revised>
<bug>398227</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Feb 2012 17:22:27 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 09:57:54 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-02-01T17:22:27Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T09:57:54Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201401-32.xml b/glsa-201401-32.xml
index 18a71126..c08ff426 100644
--- a/glsa-201401-32.xml
+++ b/glsa-201401-32.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Exim</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 3</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 3</revised>
<bug>322665</bug>
<bug>348249</bug>
<bug>353352</bug>
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2023">CVE-2010-2023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2024">CVE-2010-2024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4344">CVE-2010-4344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4345">CVE-2010-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0017">CVE-2011-0017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1407">CVE-2011-1407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1764">CVE-2011-1764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5671">CVE-2012-5671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2023">CVE-2010-2023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2024">CVE-2010-2024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4344">CVE-2010-4344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4345">CVE-2010-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0017">CVE-2011-0017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1407">CVE-2011-1407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1764">CVE-2011-1764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5671">CVE-2012-5671</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 13:05:26 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T13:05:26Z">craig</metadata>
</glsa>
diff --git a/glsa-201401-33.xml b/glsa-201401-33.xml
index b3c17b3a..b55e4c9b 100644
--- a/glsa-201401-33.xml
+++ b/glsa-201401-33.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">digest-base</product>
- <announced>January 29, 2014</announced>
- <revised>January 29, 2014: 1</revised>
+ <announced>2014-01-29</announced>
+ <revised>2014-01-29: 1</revised>
<bug>385487</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597">CVE-2011-3597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597">CVE-2011-3597</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Aug 2013 09:43:15 +0000">
+ <metadata tag="requester" timestamp="2013-08-22T09:43:15Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jan 2014 08:01:48 +0000">
+ <metadata tag="submitter" timestamp="2014-01-29T08:01:48Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201401-34.xml b/glsa-201401-34.xml
index 754a7f4a..4805c9e7 100644
--- a/glsa-201401-34.xml
+++ b/glsa-201401-34.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>January 29, 2014</announced>
- <revised>January 29, 2014: 1</revised>
+ <announced>2014-01-29</announced>
+ <revised>2014-01-29: 1</revised>
<bug>437828</bug>
<bug>446094</bug>
<bug>453974</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166">CVE-2012-5166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688">CVE-2012-5688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689">CVE-2012-5689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266">CVE-2013-2266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919">CVE-2013-3919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854">CVE-2013-4854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591">CVE-2014-0591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166">CVE-2012-5166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688">CVE-2012-5688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689">CVE-2012-5689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266">CVE-2013-2266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919">CVE-2013-3919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854">CVE-2013-4854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591">CVE-2014-0591</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:52:11 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jan 2014 22:28:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:52:11Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-29T22:28:10Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-01.xml b/glsa-201402-01.xml
index 4d1667b2..bc7713c4 100644
--- a/glsa-201402-01.xml
+++ b/glsa-201402-01.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libmicrohttpd</product>
- <announced>February 02, 2014</announced>
- <revised>February 02, 2014: 1</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-02-02: 1</revised>
<bug>493450</bug>
<access>remote</access>
<affected>
@@ -45,9 +45,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7038">CVE-2013-7038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7039">CVE-2013-7039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7038">CVE-2013-7038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7039">CVE-2013-7039</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Feb 2014 21:37:58 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 17:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-02-01T21:37:58Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T17:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201402-02.xml b/glsa-201402-02.xml
index c87f3666..b49c9c6c 100644
--- a/glsa-201402-02.xml
+++ b/glsa-201402-02.xml
@@ -6,8 +6,8 @@
access the GPU inappropriately, allowing for privilege escalation.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>February 02, 2014</announced>
- <revised>March 13, 2014: 3</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-03-13: 3</revised>
<bug>493448</bug>
<access>local</access>
<affected>
@@ -68,13 +68,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986">CVE-2013-5986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987">CVE-2013-5987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986">CVE-2013-5986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987">CVE-2013-5987</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Dec 2013 04:12:07 +0000">
+ <metadata tag="requester" timestamp="2013-12-14T04:12:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 06:49:59 +0000">
+ <metadata tag="submitter" timestamp="2014-03-13T06:49:59Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201402-03.xml b/glsa-201402-03.xml
index 2a1e83b4..3febc585 100644
--- a/glsa-201402-03.xml
+++ b/glsa-201402-03.xml
@@ -6,8 +6,8 @@
context-dependent attacker to cause Denial of Service.
</synopsis>
<product type="ebuild">pixman</product>
- <announced>February 02, 2014</announced>
- <revised>February 02, 2014: 1</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-02-02: 1</revised>
<bug>493292</bug>
<access>local, remote</access>
<affected>
@@ -47,10 +47,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6425">CVE-2013-6425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6425">CVE-2013-6425</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Dec 2013 20:19:41 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 17:59:34 +0000">
+ <metadata tag="requester" timestamp="2013-12-26T20:19:41Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T17:59:34Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201402-04.xml b/glsa-201402-04.xml
index fa39917a..090f73d0 100644
--- a/glsa-201402-04.xml
+++ b/glsa-201402-04.xml
@@ -6,8 +6,8 @@
of which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libwww-perl</product>
- <announced>February 04, 2014</announced>
- <revised>February 04, 2014: 1</revised>
+ <announced>2014-02-04</announced>
+ <revised>2014-02-04: 1</revised>
<bug>329943</bug>
<bug>386309</bug>
<access>remote</access>
@@ -53,13 +53,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2253">CVE-2010-2253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0633">CVE-2011-0633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2253">CVE-2010-2253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0633">CVE-2011-0633</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:06 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Feb 2014 15:57:46 +0000">
+ <metadata tag="submitter" timestamp="2014-02-04T15:57:46Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-05.xml b/glsa-201402-05.xml
index a972c406..c32a25b4 100644
--- a/glsa-201402-05.xml
+++ b/glsa-201402-05.xml
@@ -7,8 +7,8 @@
shared library.
</synopsis>
<product type="ebuild">banshee</product>
- <announced>February 05, 2014</announced>
- <revised>February 05, 2014: 1</revised>
+ <announced>2014-02-05</announced>
+ <revised>2014-02-05: 1</revised>
<bug>345567</bug>
<access>local</access>
<affected>
@@ -49,10 +49,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3998">CVE-2010-3998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3998">CVE-2010-3998</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Feb 2014 10:53:24 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-05T10:53:24Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-06.xml b/glsa-201402-06.xml
index 7dde80a1..b9d059a3 100644
--- a/glsa-201402-06.xml
+++ b/glsa-201402-06.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>February 06, 2014</announced>
- <revised>February 06, 2014: 1</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-06: 1</revised>
<bug>491148</bug>
<bug>493894</bug>
<bug>498170</bug>
@@ -50,18 +50,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329">CVE-2013-5329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330">CVE-2013-5330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331">CVE-2013-5331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332">CVE-2013-5332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491">CVE-2014-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492">CVE-2014-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497">CVE-2014-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329">CVE-2013-5329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330">CVE-2013-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331">CVE-2013-5331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332">CVE-2013-5332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491">CVE-2014-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492">CVE-2014-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497">CVE-2014-0497</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Nov 2013 06:52:08 +0000">
+ <metadata tag="requester" timestamp="2013-11-15T06:52:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Feb 2014 10:58:54 +0000">
+ <metadata tag="submitter" timestamp="2014-02-06T10:58:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-07.xml b/glsa-201402-07.xml
index 869b3153..fd5f197a 100644
--- a/glsa-201402-07.xml
+++ b/glsa-201402-07.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">freeciv</product>
- <announced>February 06, 2014</announced>
- <revised>February 06, 2014: 1</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-06: 1</revised>
<bug>329949</bug>
<access>remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2445">CVE-2010-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2445">CVE-2010-2445</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2011 22:27:04 +0000">
+ <metadata tag="requester" timestamp="2011-10-11T22:27:04Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Feb 2014 14:16:02 +0000">
+ <metadata tag="submitter" timestamp="2014-02-06T14:16:02Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201402-08.xml b/glsa-201402-08.xml
index c033017e..ffacb36e 100644
--- a/glsa-201402-08.xml
+++ b/glsa-201402-08.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>February 06, 2014</announced>
- <revised>February 07, 2014: 4</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-07: 4</revised>
<bug>460278</bug>
<access>remote</access>
<affected>
@@ -47,15 +47,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1762">CVE-2013-1762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1762">CVE-2013-1762</uri>
<uri link="https://www.stunnel.org/CVE-2013-1762.html">stunnel:
CVE-2013-1762
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:54:34 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:54:34Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 09:46:24 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T09:46:24Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-09.xml b/glsa-201402-09.xml
index e6a57fa1..bc7e910a 100644
--- a/glsa-201402-09.xml
+++ b/glsa-201402-09.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mod_fcgid</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>487314</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4365">CVE-2013-4365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4365">CVE-2013-4365</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jan 2014 21:08:50 +0000">
+ <metadata tag="requester" timestamp="2014-01-22T21:08:50Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 20:03:11 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T20:03:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201402-10.xml b/glsa-201402-10.xml
index 95586f42..37d404f5 100644
--- a/glsa-201402-10.xml
+++ b/glsa-201402-10.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>313329</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1299">CVE-2009-1299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1299">CVE-2009-1299</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:12:38 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 20:28:06 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:12:38Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-07T20:28:06Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201402-11.xml b/glsa-201402-11.xml
index 015678d1..938f4cbb 100644
--- a/glsa-201402-11.xml
+++ b/glsa-201402-11.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">links</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>493138</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6050">CVE-2013-6050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6050">CVE-2013-6050</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Jan 2014 10:12:18 +0000">
+ <metadata tag="requester" timestamp="2014-01-20T10:12:18Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 21:23:11 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T21:23:11Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-12.xml b/glsa-201402-12.xml
index 0ef0ac8b..688a0a03 100644
--- a/glsa-201402-12.xml
+++ b/glsa-201402-12.xml
@@ -6,8 +6,8 @@
local attackers to gain access to cleartext credentials.
</synopsis>
<product type="ebuild">pam_skey</product>
- <announced>February 09, 2014</announced>
- <revised>February 09, 2014: 1</revised>
+ <announced>2014-02-09</announced>
+ <revised>2014-02-09: 1</revised>
<bug>482588</bug>
<access>local</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4285">CVE-2013-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4285">CVE-2013-4285</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Aug 2013 10:10:48 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Feb 2014 10:46:24 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2013-08-28T10:10:48Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-02-09T10:46:24Z">a3li</metadata>
</glsa>
diff --git a/glsa-201402-13.xml b/glsa-201402-13.xml
index 14ba013f..c219abe0 100644
--- a/glsa-201402-13.xml
+++ b/glsa-201402-13.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">djvu</product>
- <announced>February 09, 2014</announced>
- <revised>February 09, 2014: 1</revised>
+ <announced>2014-02-09</announced>
+ <revised>2014-02-09: 1</revised>
<bug>497088</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6535">CVE-2012-6535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6535">CVE-2012-6535</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Feb 2014 22:03:24 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Feb 2014 12:15:30 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-02-07T22:03:24Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-09T12:15:30Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201402-14.xml b/glsa-201402-14.xml
index c2a2b939..d7d91303 100644
--- a/glsa-201402-14.xml
+++ b/glsa-201402-14.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">icu</product>
- <announced>February 10, 2014</announced>
- <revised>February 10, 2014: 1</revised>
+ <announced>2014-02-10</announced>
+ <revised>2014-02-10: 1</revised>
<bug>460426</bug>
<bug>486948</bug>
<access>remote</access>
@@ -50,13 +50,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2924">CVE-2013-2924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2924">CVE-2013-2924</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Nov 2013 07:06:44 +0000">
+ <metadata tag="requester" timestamp="2013-11-15T07:06:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Feb 2014 10:38:54 +0000">
+ <metadata tag="submitter" timestamp="2014-02-10T10:38:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-15.xml b/glsa-201402-15.xml
index afab165b..96a493f4 100644
--- a/glsa-201402-15.xml
+++ b/glsa-201402-15.xml
@@ -6,8 +6,8 @@
execution, SQL injection, or reading of arbitrary files.
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>February 11, 2014</announced>
- <revised>February 11, 2014: 1</revised>
+ <announced>2014-02-11</announced>
+ <revised>2014-02-11: 1</revised>
<bug>488954</bug>
<access>remote</access>
<affected>
@@ -52,12 +52,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6172">CVE-2013-6172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6172">CVE-2013-6172</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Nov 2013 07:52:58 +0000">
+ <metadata tag="requester" timestamp="2013-11-28T07:52:58Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Feb 2014 09:18:22 +0000">
+ <metadata tag="submitter" timestamp="2014-02-11T09:18:22Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-16.xml b/glsa-201402-16.xml
index 9c08a940..0a964ad4 100644
--- a/glsa-201402-16.xml
+++ b/glsa-201402-16.xml
@@ -7,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>February 11, 2014</announced>
- <revised>February 11, 2014: 1</revised>
+ <announced>2014-02-11</announced>
+ <revised>2014-02-11: 1</revised>
<bug>448550</bug>
<access>local, remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5668">CVE-2012-5668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5669">CVE-2012-5669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5670">CVE-2012-5670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5668">CVE-2012-5668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5669">CVE-2012-5669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5670">CVE-2012-5670</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Mar 2013 15:21:05 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Feb 2014 18:52:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-22T15:21:05Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-11T18:52:45Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-17.xml b/glsa-201402-17.xml
index 9e1a5183..5d7981ad 100644
--- a/glsa-201402-17.xml
+++ b/glsa-201402-17.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xpdf</product>
- <announced>February 17, 2014</announced>
- <revised>February 17, 2014: 1</revised>
+ <announced>2014-02-17</announced>
+ <revised>2014-02-17: 1</revised>
<bug>386271</bug>
<access>local, remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035">CVE-2009-4035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035">CVE-2009-4035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Feb 2012 22:01:40 +0000">
+ <metadata tag="requester" timestamp="2012-02-29T22:01:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Feb 2014 19:53:35 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-17T19:53:35Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-18.xml b/glsa-201402-18.xml
index aaccff4b..8cb7f5eb 100644
--- a/glsa-201402-18.xml
+++ b/glsa-201402-18.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">mc</product>
- <announced>February 20, 2014</announced>
- <revised>February 20, 2014: 1</revised>
+ <announced>2014-02-20</announced>
+ <revised>2014-02-20: 1</revised>
<bug>436518</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4463">CVE-2012-4463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4463">CVE-2012-4463</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2013 21:11:02 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Feb 2014 10:53:52 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-15T21:11:02Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-20T10:53:52Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-19.xml b/glsa-201402-19.xml
index 8db600ad..f2beea0b 100644
--- a/glsa-201402-19.xml
+++ b/glsa-201402-19.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libtar</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>487420</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4397">CVE-2013-4397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4397">CVE-2013-4397</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Oct 2013 17:33:28 +0000">
+ <metadata tag="requester" timestamp="2013-10-28T17:33:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 07:32:05 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T07:32:05Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-20.xml b/glsa-201402-20.xml
index cc74de52..8425594c 100644
--- a/glsa-201402-20.xml
+++ b/glsa-201402-20.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">kvirc</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>326149</bug>
<bug>330111</bug>
<access>remote</access>
@@ -48,12 +48,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2451">CVE-2010-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2452">CVE-2010-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2785">CVE-2010-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2451">CVE-2010-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2452">CVE-2010-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2785">CVE-2010-2785</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:28 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:14:41 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:28Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:14:41Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-21.xml b/glsa-201402-21.xml
index c37af136..d5379276 100644
--- a/glsa-201402-21.xml
+++ b/glsa-201402-21.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>440154</bug>
<bug>440944</bug>
<bug>468334</bug>
@@ -61,18 +61,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4447">CVE-2012-4447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4564">CVE-2012-4564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1960">CVE-2013-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1961">CVE-2013-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4231">CVE-2013-4231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4232">CVE-2013-4232</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4244">CVE-2013-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4447">CVE-2012-4447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4564">CVE-2012-4564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1960">CVE-2013-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1961">CVE-2013-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4231">CVE-2013-4231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4232">CVE-2013-4232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4244">CVE-2013-4244</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Sep 2013 10:35:33 +0000">
+ <metadata tag="requester" timestamp="2013-09-02T10:35:33Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:18:04 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:18:04Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-22.xml b/glsa-201402-22.xml
index 97599c52..9afd8fd4 100644
--- a/glsa-201402-22.xml
+++ b/glsa-201402-22.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">tcptrack</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>377917</bug>
<access>local</access>
<affected>
@@ -51,12 +51,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2903">CVE-2011-2903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2903">CVE-2011-2903</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:14 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:21:47 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:21:47Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201402-23.xml b/glsa-201402-23.xml
index b884a6c7..d7f3c340 100644
--- a/glsa-201402-23.xml
+++ b/glsa-201402-23.xml
@@ -6,8 +6,8 @@
which allow for local privilege escalation.
</synopsis>
<product type="ebuild">libxfont</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>378797</bug>
<bug>497416</bug>
<access>local</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2895">CVE-2011-2895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6462">CVE-2013-6462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2895">CVE-2011-2895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6462">CVE-2013-6462</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:46 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:46Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:29:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:29:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201402-24.xml b/glsa-201402-24.xml
index 0420ab56..8242a94c 100644
--- a/glsa-201402-24.xml
+++ b/glsa-201402-24.xml
@@ -7,8 +7,8 @@
Service, or the disclosure of private keys.
</synopsis>
<product type="ebuild">gnupg libgcrypt</product>
- <announced>February 21, 2014</announced>
- <revised>August 24, 2016: 3</revised>
+ <announced>2014-02-21</announced>
+ <revised>2016-08-24: 3</revised>
<bug>449546</bug>
<bug>478184</bug>
<bug>484836</bug>
@@ -78,14 +78,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6085">CVE-2012-6085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4242">CVE-2013-4242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4351">CVE-2013-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4402">CVE-2013-4402</uri>
- <uri link="http://eprint.iacr.org/2013/448">Flush+Reload: a High
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6085">CVE-2012-6085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4242">CVE-2013-4242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4351">CVE-2013-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4402">CVE-2013-4402</uri>
+ <uri link="https://eprint.iacr.org/2013/448">Flush+Reload: a High
Resolution, Low Noise, L3 Cache Side-Channel Attack
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2013 21:37:26 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Aug 2016 12:08:25 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-15T21:37:26Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2016-08-24T12:08:25Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-25.xml b/glsa-201402-25.xml
index 65f974cf..83010b81 100644
--- a/glsa-201402-25.xml
+++ b/glsa-201402-25.xml
@@ -6,8 +6,8 @@
result in a Denial of Service condition.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>497838</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4353">CVE-2013-4353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4353">CVE-2013-4353</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:18:59 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:18:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:36:48 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:36:48Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201402-26.xml b/glsa-201402-26.xml
index 60fe7458..e57e541d 100644
--- a/glsa-201402-26.xml
+++ b/glsa-201402-26.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libssh</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>444147</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4559">CVE-2012-4559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4560">CVE-2012-4560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4561">CVE-2012-4561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4562">CVE-2012-4562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6063">CVE-2012-6063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4559">CVE-2012-4559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4560">CVE-2012-4560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4561">CVE-2012-4561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4562">CVE-2012-4562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6063">CVE-2012-6063</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 03 Dec 2012 11:55:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:44:25 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-03T11:55:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:44:25Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-27.xml b/glsa-201402-27.xml
index 711dc1ed..b6367069 100644
--- a/glsa-201402-27.xml
+++ b/glsa-201402-27.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">pidgin-knotify</product>
- <announced>February 26, 2014</announced>
- <revised>February 26, 2014: 1</revised>
+ <announced>2014-02-26</announced>
+ <revised>2014-02-26: 1</revised>
<bug>336916</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3088">CVE-2010-3088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3088">CVE-2010-3088</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 18:54:54 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Feb 2014 14:28:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T18:54:54Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-26T14:28:15Z">ackle</metadata>
</glsa>
diff --git a/glsa-201402-28.xml b/glsa-201402-28.xml
index cc7f6021..4aae40a3 100644
--- a/glsa-201402-28.xml
+++ b/glsa-201402-28.xml
@@ -6,8 +6,8 @@
allowing remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">chrony</product>
- <announced>February 28, 2014</announced>
- <revised>February 28, 2014: 1</revised>
+ <announced>2014-02-28</announced>
+ <revised>2014-02-28: 1</revised>
<bug>480364</bug>
<access>remote</access>
<affected>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4502">CVE-2012-4502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4503">CVE-2012-4503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4502">CVE-2012-4502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4503">CVE-2012-4503</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Oct 2011 13:39:51 +0000">
+ <metadata tag="requester" timestamp="2011-10-19T13:39:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Feb 2014 10:05:17 +0000">
+ <metadata tag="submitter" timestamp="2014-02-28T10:05:17Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201402-29.xml b/glsa-201402-29.xml
index 08096426..716138df 100644
--- a/glsa-201402-29.xml
+++ b/glsa-201402-29.xml
@@ -6,8 +6,8 @@
ArgyllCMS which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">argyllcms</product>
- <announced>February 28, 2014</announced>
- <revised>February 28, 2014: 1</revised>
+ <announced>2014-02-28</announced>
+ <revised>2014-02-28: 1</revised>
<bug>437652</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2012 14:48:08 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Feb 2014 10:11:22 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-02T14:48:08Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-28T10:11:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201403-01.xml b/glsa-201403-01.xml
index 0fb960bb..12f7da6a 100644
--- a/glsa-201403-01.xml
+++ b/glsa-201403-01.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>March 05, 2014</announced>
- <revised>March 05, 2014: 1</revised>
+ <announced>2014-03-05</announced>
+ <revised>2014-03-05: 1</revised>
<bug>486742</bug>
<bug>488148</bug>
<bug>491128</bug>
@@ -68,74 +68,74 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906">CVE-2013-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907">CVE-2013-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908">CVE-2013-2908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909">CVE-2013-2909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910">CVE-2013-2910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911">CVE-2013-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912">CVE-2013-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913">CVE-2013-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915">CVE-2013-2915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916">CVE-2013-2916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917">CVE-2013-2917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918">CVE-2013-2918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919">CVE-2013-2919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920">CVE-2013-2920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921">CVE-2013-2921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922">CVE-2013-2922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923">CVE-2013-2923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2925">CVE-2013-2925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2926">CVE-2013-2926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2927">CVE-2013-2927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2928">CVE-2013-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2931">CVE-2013-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6621">CVE-2013-6621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6622">CVE-2013-6622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6623">CVE-2013-6623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6624">CVE-2013-6624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6625">CVE-2013-6625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6626">CVE-2013-6626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6627">CVE-2013-6627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6628">CVE-2013-6628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632">CVE-2013-6632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6634">CVE-2013-6634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6635">CVE-2013-6635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6636">CVE-2013-6636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6637">CVE-2013-6637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6638">CVE-2013-6638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6639">CVE-2013-6639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6640">CVE-2013-6640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6641">CVE-2013-6641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6643">CVE-2013-6643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6644">CVE-2013-6644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6645">CVE-2013-6645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6646">CVE-2013-6646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6649">CVE-2013-6649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6650">CVE-2013-6650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6652">CVE-2013-6652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6653">CVE-2013-6653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6654">CVE-2013-6654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6655">CVE-2013-6655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6656">CVE-2013-6656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6657">CVE-2013-6657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6658">CVE-2013-6658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6659">CVE-2013-6659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6660">CVE-2013-6660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6661">CVE-2013-6661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6663">CVE-2013-6663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6664">CVE-2013-6664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6665">CVE-2013-6665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6666">CVE-2013-6666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6667">CVE-2013-6667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6668">CVE-2013-6668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802">CVE-2013-6802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1681">CVE-2014-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906">CVE-2013-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907">CVE-2013-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908">CVE-2013-2908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909">CVE-2013-2909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910">CVE-2013-2910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911">CVE-2013-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912">CVE-2013-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913">CVE-2013-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915">CVE-2013-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916">CVE-2013-2916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917">CVE-2013-2917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918">CVE-2013-2918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919">CVE-2013-2919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920">CVE-2013-2920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921">CVE-2013-2921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922">CVE-2013-2922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923">CVE-2013-2923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2925">CVE-2013-2925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2926">CVE-2013-2926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2927">CVE-2013-2927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2928">CVE-2013-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2931">CVE-2013-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6621">CVE-2013-6621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6622">CVE-2013-6622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6623">CVE-2013-6623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6624">CVE-2013-6624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6625">CVE-2013-6625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6626">CVE-2013-6626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6627">CVE-2013-6627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6628">CVE-2013-6628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632">CVE-2013-6632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6634">CVE-2013-6634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6635">CVE-2013-6635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6636">CVE-2013-6636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6637">CVE-2013-6637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6638">CVE-2013-6638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6639">CVE-2013-6639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6640">CVE-2013-6640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6641">CVE-2013-6641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6643">CVE-2013-6643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6644">CVE-2013-6644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6645">CVE-2013-6645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6646">CVE-2013-6646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6649">CVE-2013-6649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6650">CVE-2013-6650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6652">CVE-2013-6652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6653">CVE-2013-6653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6654">CVE-2013-6654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6655">CVE-2013-6655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6656">CVE-2013-6656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6657">CVE-2013-6657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6658">CVE-2013-6658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6659">CVE-2013-6659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6660">CVE-2013-6660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6661">CVE-2013-6661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6663">CVE-2013-6663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6664">CVE-2013-6664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6665">CVE-2013-6665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6666">CVE-2013-6666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6667">CVE-2013-6667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6668">CVE-2013-6668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802">CVE-2013-6802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1681">CVE-2014-1681</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Oct 2013 06:36:15 +0000">
+ <metadata tag="requester" timestamp="2013-10-04T06:36:15Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2014 10:57:09 +0000">
+ <metadata tag="submitter" timestamp="2014-03-05T10:57:09Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201403-02.xml b/glsa-201403-02.xml
index faad0adc..12f189d1 100644
--- a/glsa-201403-02.xml
+++ b/glsa-201403-02.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">libyaml</product>
- <announced>March 08, 2014</announced>
- <revised>March 08, 2014: 1</revised>
+ <announced>2014-03-08</announced>
+ <revised>2014-03-08: 1</revised>
<bug>499920</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6393">CVE-2013-6393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6393">CVE-2013-6393</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Feb 2014 09:37:47 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Mar 2014 18:35:33 +0000">
+ <metadata tag="requester" timestamp="2014-02-18T09:37:47Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-08T18:35:33Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201403-03.xml b/glsa-201403-03.xml
index 799b5f0c..ff79983d 100644
--- a/glsa-201403-03.xml
+++ b/glsa-201403-03.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service.</synopsis>
<product type="ebuild">file</product>
- <announced>March 13, 2014</announced>
- <revised>March 13, 2014: 1</revised>
+ <announced>2014-03-13</announced>
+ <revised>2014-03-13: 1</revised>
<bug>501574</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Feb 2014 08:49:09 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 16:36:21 +0000">
+ <metadata tag="requester" timestamp="2014-02-22T08:49:09Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-13T16:36:21Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201403-04.xml b/glsa-201403-04.xml
index 6deb9f2f..d08ab9d3 100644
--- a/glsa-201403-04.xml
+++ b/glsa-201403-04.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">qt-core</product>
- <announced>March 13, 2014</announced>
- <revised>March 13, 2014: 1</revised>
+ <announced>2014-03-13</announced>
+ <revised>2014-03-13: 1</revised>
<bug>494728</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4549">CVE-2013-4549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4549">CVE-2013-4549</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Feb 2014 14:50:40 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 16:57:59 +0000">
+ <metadata tag="requester" timestamp="2014-02-19T14:50:40Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-13T16:57:59Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201403-05.xml b/glsa-201403-05.xml
index 41c1fc2a..c7ac7149 100644
--- a/glsa-201403-05.xml
+++ b/glsa-201403-05.xml
@@ -6,8 +6,8 @@
to user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">emacs</product>
- <announced>March 20, 2014</announced>
- <revised>March 20, 2014: 1</revised>
+ <announced>2014-03-20</announced>
+ <revised>2014-03-20: 1</revised>
<bug>398239</bug>
<bug>431178</bug>
<access>remote</access>
@@ -59,9 +59,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3479">CVE-2012-3479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3479">CVE-2012-3479</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2012 09:37:15 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Mar 2014 10:30:13 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-16T09:37:15Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2014-03-20T10:30:13Z">ackle</metadata>
</glsa>
diff --git a/glsa-201403-06.xml b/glsa-201403-06.xml
index 39a0d6ee..6f311219 100644
--- a/glsa-201403-06.xml
+++ b/glsa-201403-06.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libupnp</product>
- <announced>March 26, 2014</announced>
- <revised>March 26, 2014: 1</revised>
+ <announced>2014-03-26</announced>
+ <revised>2014-03-26: 1</revised>
<bug>454570</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5958">CVE-2012-5958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5959">CVE-2012-5959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5960">CVE-2012-5960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5958">CVE-2012-5958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5959">CVE-2012-5959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5960">CVE-2012-5960</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 15:38:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Mar 2014 10:27:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T15:38:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-03-26T10:27:19Z">ackle</metadata>
</glsa>
diff --git a/glsa-201403-07.xml b/glsa-201403-07.xml
index 1384a2f0..97602544 100644
--- a/glsa-201403-07.xml
+++ b/glsa-201403-07.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">grep</product>
- <announced>March 26, 2014</announced>
- <revised>March 26, 2014: 1</revised>
+ <announced>2014-03-26</announced>
+ <revised>2014-03-26: 1</revised>
<bug>448246</bug>
<access>local, remote</access>
<affected>
@@ -40,8 +40,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5667">CVE-2012-5667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5667">CVE-2012-5667</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Dec 2012 16:52:28 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Mar 2014 15:39:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-26T16:52:28Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-03-26T15:39:34Z">ackle</metadata>
</glsa>
diff --git a/glsa-201403-08.xml b/glsa-201403-08.xml
index 6c43feee..71eba2cb 100644
--- a/glsa-201403-08.xml
+++ b/glsa-201403-08.xml
@@ -6,8 +6,8 @@
Authentication
</synopsis>
<product type="ebuild">PlRPC</product>
- <announced>March 27, 2014</announced>
- <revised>March 27, 2014: 1</revised>
+ <announced>2014-03-27</announced>
+ <revised>2014-03-27: 1</revised>
<bug>497692</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7284">CVE-2013-7284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7284">CVE-2013-7284</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:14:53 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:14:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Mar 2014 10:25:44 +0000">
+ <metadata tag="submitter" timestamp="2014-03-27T10:25:44Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201404-01.xml b/glsa-201404-01.xml
index 054a83ee..7e798f67 100644
--- a/glsa-201404-01.xml
+++ b/glsa-201404-01.xml
@@ -4,8 +4,8 @@
<title>CUPS: Arbitrary file read/write</title>
<synopsis>A vulnerability in CUPS may allow for arbitrary file access.</synopsis>
<product type="ebuild">cups</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>442926</bug>
<access>local</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5519">CVE-2012-5519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5519">CVE-2012-5519</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Aug 2013 11:14:06 +0000">
+ <metadata tag="requester" timestamp="2013-08-30T11:14:06Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 07:41:06 +0000">
+ <metadata tag="submitter" timestamp="2014-04-07T07:41:06Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201404-02.xml b/glsa-201404-02.xml
index cc19f708..a27a8d66 100644
--- a/glsa-201404-02.xml
+++ b/glsa-201404-02.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">libproxy</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>438146</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4504">CVE-2012-4504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4504">CVE-2012-4504</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Nov 2012 01:36:57 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 18:48:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-26T01:36:57Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T18:48:48Z">ackle</metadata>
</glsa>
diff --git a/glsa-201404-03.xml b/glsa-201404-03.xml
index 0046c989..93cc7f1c 100644
--- a/glsa-201404-03.xml
+++ b/glsa-201404-03.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>435340</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4432">CVE-2012-4432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4432">CVE-2012-4432</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 16:00:25 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 20:09:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T16:00:25Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T20:09:15Z">ackle</metadata>
</glsa>
diff --git a/glsa-201404-04.xml b/glsa-201404-04.xml
index e5f9cdfb..698df158 100644
--- a/glsa-201404-04.xml
+++ b/glsa-201404-04.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">crack</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>460164</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1800">CVE-2013-1800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1800">CVE-2013-1800</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 18:59:21 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 20:37:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T18:59:21Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T20:37:34Z">ackle</metadata>
</glsa>
diff --git a/glsa-201404-05.xml b/glsa-201404-05.xml
index 1f8eb969..75672f63 100644
--- a/glsa-201404-05.xml
+++ b/glsa-201404-05.xml
@@ -6,8 +6,8 @@
can allow attackers to execute arbitrary code
</synopsis>
<product type="ebuild">openafs</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>265538</bug>
<bug>355533</bug>
<bug>460494</bug>
@@ -51,19 +51,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1250">CVE-2009-1250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1251">CVE-2009-1251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0430">CVE-2011-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0431">CVE-2011-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1794">CVE-2013-1794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1795">CVE-2013-1795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4134">CVE-2013-4134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4135">CVE-2013-4135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1250">CVE-2009-1250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1251">CVE-2009-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0430">CVE-2011-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0431">CVE-2011-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1794">CVE-2013-1794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1795">CVE-2013-1795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4134">CVE-2013-4134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4135">CVE-2013-4135</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:40 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 21:22:36 +0000">
+ <metadata tag="submitter" timestamp="2014-04-07T21:22:36Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201404-06.xml b/glsa-201404-06.xml
index eb648cc7..77084c0d 100644
--- a/glsa-201404-06.xml
+++ b/glsa-201404-06.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mesa</product>
- <announced>April 08, 2014</announced>
- <revised>April 08, 2014: 1</revised>
+ <announced>2014-04-08</announced>
+ <revised>2014-04-08: 1</revised>
<bug>432400</bug>
<bug>445916</bug>
<bug>472280</bug>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2864">CVE-2012-2864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5129">CVE-2012-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1872">CVE-2013-1872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2864">CVE-2012-2864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5129">CVE-2012-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1872">CVE-2013-1872</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2012 15:24:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Apr 2014 08:42:29 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-02T15:24:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-08T08:42:29Z">ackle</metadata>
</glsa>
diff --git a/glsa-201404-07.xml b/glsa-201404-07.xml
index 785480be..91ca3db1 100644
--- a/glsa-201404-07.xml
+++ b/glsa-201404-07.xml
@@ -6,8 +6,8 @@
remote attackers to obtain sensitive information via various vectors.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>April 08, 2014</announced>
- <revised>June 06, 2015: 4</revised>
+ <announced>2014-04-08</announced>
+ <revised>2015-06-06: 4</revised>
<bug>505278</bug>
<bug>507074</bug>
<access>remote</access>
@@ -82,10 +82,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0076">CVE-2014-0076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0076">CVE-2014-0076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
<uri link="http://heartbleed.com/">Heartbleed bug website</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Apr 2014 09:37:45 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:11:05 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2014-04-08T09:37:45Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:11:05Z">a3li</metadata>
</glsa>
diff --git a/glsa-201405-01.xml b/glsa-201405-01.xml
index 1832314f..63128b60 100644
--- a/glsa-201405-01.xml
+++ b/glsa-201405-01.xml
@@ -7,8 +7,8 @@
cause Denial of Service.
</synopsis>
<product type="ebuild">udisks</product>
- <announced>May 02, 2014</announced>
- <revised>May 02, 2014: 1</revised>
+ <announced>2014-05-02</announced>
+ <revised>2014-05-02: 1</revised>
<bug>504100</bug>
<access>local</access>
<affected>
@@ -53,10 +53,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0004">CVE-2014-0004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0004">CVE-2014-0004</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 22:02:46 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T22:02:46Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 May 2014 06:36:09 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-02T06:36:09Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201405-02.xml b/glsa-201405-02.xml
index c22f47d5..909b2e56 100644
--- a/glsa-201405-02.xml
+++ b/glsa-201405-02.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">libsrtp</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>472302</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2139">CVE-2013-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2139">CVE-2013-2139</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Feb 2014 14:44:21 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 13:23:32 +0000">
+ <metadata tag="requester" timestamp="2014-02-04T14:44:21Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-03T13:23:32Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201405-03.xml b/glsa-201405-03.xml
index 6ef2d33a..25782fe5 100644
--- a/glsa-201405-03.xml
+++ b/glsa-201405-03.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">weechat</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>442600</bug>
<access>remote</access>
<affected>
@@ -52,9 +52,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5534">CVE-2012-5534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5854">CVE-2012-5854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5534">CVE-2012-5534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5854">CVE-2012-5854</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Nov 2012 20:56:00 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 13:54:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-21T20:56:00Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-03T13:54:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-04.xml b/glsa-201405-04.xml
index b8c4f523..3ab21fb0 100644
--- a/glsa-201405-04.xml
+++ b/glsa-201405-04.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>501960</bug>
<bug>504286</bug>
<bug>507176</bug>
@@ -51,21 +51,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0498">CVE-2014-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0499">CVE-2014-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0502">CVE-2014-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0503">CVE-2014-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0504">CVE-2014-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0506">CVE-2014-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0507">CVE-2014-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0508">CVE-2014-0508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0509">CVE-2014-0509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0515">CVE-2014-0515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0498">CVE-2014-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0499">CVE-2014-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0502">CVE-2014-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0503">CVE-2014-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0504">CVE-2014-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0506">CVE-2014-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0507">CVE-2014-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0508">CVE-2014-0508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0509">CVE-2014-0509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0515">CVE-2014-0515</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Feb 2014 14:21:18 +0000">
+ <metadata tag="requester" timestamp="2014-02-26T14:21:18Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 18:43:48 +0000">
+ <metadata tag="submitter" timestamp="2014-05-03T18:43:48Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201405-05.xml b/glsa-201405-05.xml
index e232071f..cbf628ac 100644
--- a/glsa-201405-05.xml
+++ b/glsa-201405-05.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>504180</bug>
<access>remote</access>
<affected>
@@ -49,27 +49,27 @@
</resolution>
<references>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-001.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-001.pdf">
AST-2014-001
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-002.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-002.pdf">
AST-2014-002
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-003.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-003.pdf">
AST-2014-003
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-004.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-004.pdf">
AST-2014-004
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2286">CVE-2014-2286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2287">CVE-2014-2287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2288">CVE-2014-2288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2289">CVE-2014-2289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2286">CVE-2014-2286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2287">CVE-2014-2287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2288">CVE-2014-2288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2289">CVE-2014-2289</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Apr 2014 19:55:21 +0000">
+ <metadata tag="requester" timestamp="2014-04-23T19:55:21Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 18:50:01 +0000">
+ <metadata tag="submitter" timestamp="2014-05-03T18:50:01Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201405-06.xml b/glsa-201405-06.xml
index 9eb428a9..cffd3248 100644
--- a/glsa-201405-06.xml
+++ b/glsa-201405-06.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>May 11, 2014</announced>
- <revised>May 11, 2014: 1</revised>
+ <announced>2014-05-11</announced>
+ <revised>2014-05-11: 1</revised>
<bug>231292</bug>
<bug>247466</bug>
<bug>386307</bug>
@@ -56,30 +56,30 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161">
CVE-2008-5161
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478">
CVE-2010-4478
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755">
CVE-2010-4755
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107">CVE-2010-5107</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107">CVE-2010-5107</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000">
CVE-2011-5000
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814">
CVE-2012-0814
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532">
CVE-2014-2532
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 May 2014 13:22:11 +0000">
+ <metadata tag="submitter" timestamp="2014-05-11T13:22:11Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201405-07.xml b/glsa-201405-07.xml
index bba1aab8..6d476b01 100644
--- a/glsa-201405-07.xml
+++ b/glsa-201405-07.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>May 15, 2014</announced>
- <revised>May 15, 2014: 1</revised>
+ <announced>2014-05-15</announced>
+ <revised>2014-05-15: 1</revised>
<bug>466222</bug>
<bug>471098</bug>
<bug>487360</bug>
@@ -48,43 +48,43 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1056">CVE-2013-1056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1940">CVE-2013-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1981">CVE-2013-1981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1982">CVE-2013-1982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1983">CVE-2013-1983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1984">CVE-2013-1984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1985">CVE-2013-1985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1986">CVE-2013-1986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1987">CVE-2013-1987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1988">CVE-2013-1988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1989">CVE-2013-1989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1990">CVE-2013-1990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1991">CVE-2013-1991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1992">CVE-2013-1992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1993">CVE-2013-1993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1994">CVE-2013-1994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1995">CVE-2013-1995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1996">CVE-2013-1996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1997">CVE-2013-1997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1998">CVE-2013-1998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1999">CVE-2013-1999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2000">CVE-2013-2000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2001">CVE-2013-2001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2002">CVE-2013-2002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2003">CVE-2013-2003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2004">CVE-2013-2004</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2005">CVE-2013-2005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2062">CVE-2013-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2063">CVE-2013-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2064">CVE-2013-2064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2066">CVE-2013-2066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4396">CVE-2013-4396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1056">CVE-2013-1056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1940">CVE-2013-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1981">CVE-2013-1981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1982">CVE-2013-1982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1983">CVE-2013-1983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1984">CVE-2013-1984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1985">CVE-2013-1985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1986">CVE-2013-1986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1987">CVE-2013-1987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1988">CVE-2013-1988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1989">CVE-2013-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1990">CVE-2013-1990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1991">CVE-2013-1991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1992">CVE-2013-1992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1993">CVE-2013-1993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1994">CVE-2013-1994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1995">CVE-2013-1995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1996">CVE-2013-1996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1997">CVE-2013-1997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1998">CVE-2013-1998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1999">CVE-2013-1999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2000">CVE-2013-2000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2001">CVE-2013-2001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2002">CVE-2013-2002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2003">CVE-2013-2003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2004">CVE-2013-2004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2005">CVE-2013-2005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2062">CVE-2013-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2063">CVE-2013-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2064">CVE-2013-2064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2066">CVE-2013-2066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4396">CVE-2013-4396</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Oct 2013 17:45:33 +0000">
+ <metadata tag="requester" timestamp="2013-10-28T17:45:33Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 May 2014 11:50:15 +0000">
+ <metadata tag="submitter" timestamp="2014-05-15T11:50:15Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201405-08.xml b/glsa-201405-08.xml
index 7daba39a..fed09416 100644
--- a/glsa-201405-08.xml
+++ b/glsa-201405-08.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 16, 2014</announced>
- <revised>May 16, 2014: 1</revised>
+ <announced>2014-05-16</announced>
+ <revised>2014-05-16: 1</revised>
<bug>462278</bug>
<bug>467710</bug>
<access>remote</access>
@@ -45,16 +45,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2020">CVE-2013-2020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2021">CVE-2013-2021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7087">CVE-2013-7087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7088">CVE-2013-7088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7089">CVE-2013-7089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2020">CVE-2013-2020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2021">CVE-2013-2021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7087">CVE-2013-7087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7088">CVE-2013-7088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7089">CVE-2013-7089</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 04:06:14 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T04:06:14Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 May 2014 12:36:41 +0000">
+ <metadata tag="submitter" timestamp="2014-05-16T12:36:41Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201405-09.xml b/glsa-201405-09.xml
index e96c26e1..359a4aad 100644
--- a/glsa-201405-09.xml
+++ b/glsa-201405-09.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>409431</bug>
<bug>483032</bug>
<bug>500988</bug>
@@ -52,16 +52,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1185">CVE-2012-1185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1186">CVE-2012-1186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4298">CVE-2013-4298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1947">CVE-2014-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2030">CVE-2014-2030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1185">CVE-2012-1185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1186">CVE-2012-1186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4298">CVE-2013-4298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1947">CVE-2014-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2030">CVE-2014-2030</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 May 2012 02:54:09 +0000">
+ <metadata tag="requester" timestamp="2012-05-07T02:54:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 13:31:31 +0000">
+ <metadata tag="submitter" timestamp="2014-05-17T13:31:31Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201405-10.xml b/glsa-201405-10.xml
index 11556905..a4d3f629 100644
--- a/glsa-201405-10.xml
+++ b/glsa-201405-10.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">rack</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>451620</bug>
<bug>456176</bug>
<access>remote</access>
@@ -67,14 +67,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6109">CVE-2012-6109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0183">CVE-2013-0183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0184">CVE-2013-0184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0262">CVE-2013-0262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0263">CVE-2013-0263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6109">CVE-2012-6109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0183">CVE-2013-0183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0184">CVE-2013-0184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0262">CVE-2013-0262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0263">CVE-2013-0263</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:45:11 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:45:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:44:33 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:44:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-11.xml b/glsa-201405-11.xml
index 89bbb9d3..8a4744ef 100644
--- a/glsa-201405-11.xml
+++ b/glsa-201405-11.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">bacula</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>434878</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4430">CVE-2012-4430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4430">CVE-2012-4430</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:54:47 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:45:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:54:47Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:45:37Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-12.xml b/glsa-201405-12.xml
index 8119fbd9..55793389 100644
--- a/glsa-201405-12.xml
+++ b/glsa-201405-12.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>340897</bug>
<bug>451198</bug>
<access>remote</access>
@@ -56,10 +56,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3843">CVE-2010-3843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3844">CVE-2010-3844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722">CVE-2013-0722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3843">CVE-2010-3843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3844">CVE-2010-3844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722">CVE-2013-0722</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Oct 2012 00:56:47 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:46:36 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-10-15T00:56:47Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:46:36Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-13.xml b/glsa-201405-13.xml
index 2d81f65c..4614822a 100644
--- a/glsa-201405-13.xml
+++ b/glsa-201405-13.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">pango</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>268976</bug>
<bug>352087</bug>
<bug>357067</bug>
@@ -54,13 +54,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1194">CVE-2009-1194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2468">CVE-2009-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0020">CVE-2011-0020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0064">CVE-2011-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1194">CVE-2009-1194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2468">CVE-2009-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0020">CVE-2011-0020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0064">CVE-2011-0064</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:43 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:48:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:48:11Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-14.xml b/glsa-201405-14.xml
index 0a7df1d4..1ce85465 100644
--- a/glsa-201405-14.xml
+++ b/glsa-201405-14.xml
@@ -4,8 +4,8 @@
<title>Ruby OpenID: Denial of Service</title>
<synopsis>A vulnerability in Ruby OpenID may lead to Denial of Service.</synopsis>
<product type="ebuild">ruby-openid</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>460156</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1812">CVE-2013-1812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1812">CVE-2013-1812</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Apr 2013 22:41:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:48:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-09T22:41:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:48:57Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-15.xml b/glsa-201405-15.xml
index 4662511a..770806e6 100644
--- a/glsa-201405-15.xml
+++ b/glsa-201405-15.xml
@@ -6,8 +6,8 @@
of which may lead to Denial of Service.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>359759</bug>
<bug>450740</bug>
<access>local</access>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1675">CVE-2011-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1676">CVE-2011-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1677">CVE-2011-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0157">CVE-2013-0157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1675">CVE-2011-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1676">CVE-2011-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1677">CVE-2011-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0157">CVE-2013-0157</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:27:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:27:32Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-16.xml b/glsa-201405-16.xml
index fecc2bf3..d7068d5b 100644
--- a/glsa-201405-16.xml
+++ b/glsa-201405-16.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mono</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>433768</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3543">CVE-2012-3543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3543">CVE-2012-3543</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:55:51 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:28:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:55:51Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:28:30Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-17.xml b/glsa-201405-17.xml
index 07d1ee4d..d516e718 100644
--- a/glsa-201405-17.xml
+++ b/glsa-201405-17.xml
@@ -6,8 +6,8 @@
lead to symlink attacks, file creation, or bypass of security restrictions.
</synopsis>
<product type="ebuild">munin</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>412881</bug>
<bug>445250</bug>
<access>local, remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2103">CVE-2012-2103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3512">CVE-2012-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3513">CVE-2012-3513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2103">CVE-2012-2103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3512">CVE-2012-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3513">CVE-2012-3513</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Dec 2012 00:14:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:35:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-23T00:14:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:35:16Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-18.xml b/glsa-201405-18.xml
index c6848436..ae2642de 100644
--- a/glsa-201405-18.xml
+++ b/glsa-201405-18.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">openconnect</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>457068</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6128">CVE-2012-6128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6128">CVE-2012-6128</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Apr 2013 22:03:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:36:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-08T22:03:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:36:30Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-19.xml b/glsa-201405-19.xml
index 6525d472..8a294d01 100644
--- a/glsa-201405-19.xml
+++ b/glsa-201405-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mcrypt</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>434112</bug>
<bug>440778</bug>
<access>remote</access>
@@ -51,10 +51,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4409">CVE-2012-4409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4426">CVE-2012-4426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4527">CVE-2012-4527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4409">CVE-2012-4409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4426">CVE-2012-4426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4527">CVE-2012-4527</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2013 21:30:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:39:31 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-01T21:30:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:39:31Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-20.xml b/glsa-201405-20.xml
index 9e12fa90..bc50aa60 100644
--- a/glsa-201405-20.xml
+++ b/glsa-201405-20.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">jbigkit</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>507254</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6369">CVE-2013-6369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6369">CVE-2013-6369</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 03:04:08 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T03:04:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 12:48:40 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T12:48:40Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201405-21.xml b/glsa-201405-21.xml
index e3de4fe4..03255f84 100644
--- a/glsa-201405-21.xml
+++ b/glsa-201405-21.xml
@@ -6,8 +6,8 @@
possibly resulting in remote Denial of Service.
</synopsis>
<product type="ebuild">shadowircd</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>449544</bug>
<bug>449790</bug>
<access>remote</access>
@@ -54,10 +54,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6084">CVE-2012-6084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6084">CVE-2012-6084</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Jan 2013 17:21:58 +0000">
+ <metadata tag="requester" timestamp="2013-01-03T17:21:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:28:17 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:28:17Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-22.xml b/glsa-201405-22.xml
index a6d72374..30051e3a 100644
--- a/glsa-201405-22.xml
+++ b/glsa-201405-22.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>457580</bug>
<bug>499596</bug>
<access>remote</access>
@@ -58,24 +58,24 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6152">CVE-2012-6152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0271">CVE-2013-0271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0272">CVE-2013-0272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0273">CVE-2013-0273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0274">CVE-2013-0274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6477">CVE-2013-6477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6478">CVE-2013-6478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6479">CVE-2013-6479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6481">CVE-2013-6481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6482">CVE-2013-6482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6483">CVE-2013-6483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6484">CVE-2013-6484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6485">CVE-2013-6485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6489">CVE-2013-6489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6490">CVE-2013-6490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0020">CVE-2014-0020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6152">CVE-2012-6152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0271">CVE-2013-0271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0272">CVE-2013-0272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0273">CVE-2013-0273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0274">CVE-2013-0274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6477">CVE-2013-6477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6478">CVE-2013-6478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6479">CVE-2013-6479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6481">CVE-2013-6481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6482">CVE-2013-6482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6483">CVE-2013-6483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6484">CVE-2013-6484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6485">CVE-2013-6485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6489">CVE-2013-6489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6490">CVE-2013-6490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0020">CVE-2014-0020</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 15:51:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:28:53 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T15:51:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:28:53Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-23.xml b/glsa-201405-23.xml
index 530320fb..faf4efff 100644
--- a/glsa-201405-23.xml
+++ b/glsa-201405-23.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">lib3ds</product>
- <announced>May 18, 2014</announced>
- <revised>December 10, 2014: 2</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-12-10: 2</revised>
<bug>308033</bug>
<bug>519936</bug>
<access>remote</access>
@@ -54,8 +54,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0280">CVE-2010-0280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0280">CVE-2010-0280</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:22:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Dec 2014 00:42:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:22:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-10T00:42:02Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-24.xml b/glsa-201405-24.xml
index 86e88be4..d3697612 100644
--- a/glsa-201405-24.xml
+++ b/glsa-201405-24.xml
@@ -6,8 +6,8 @@
Utility Library could result in Denial of Service.
</synopsis>
<product type="ebuild">apr apr-util</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>339527</bug>
<bug>366903</bug>
<bug>368651</bug>
@@ -65,13 +65,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623">CVE-2010-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419">CVE-2011-0419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928">CVE-2011-1928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840">CVE-2012-0840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623">CVE-2010-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419">CVE-2011-0419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928">CVE-2011-1928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840">CVE-2012-0840</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:24 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:24Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:30:44 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:30:44Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-25.xml b/glsa-201405-25.xml
index 5896ff81..5d9d7543 100644
--- a/glsa-201405-25.xml
+++ b/glsa-201405-25.xml
@@ -6,8 +6,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">symfony</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>444696</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5574">CVE-2012-5574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5574">CVE-2012-5574</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Dec 2012 03:37:50 +0000">
+ <metadata tag="requester" timestamp="2012-12-17T03:37:50Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:31:18 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:31:18Z">ackle</metadata>
</glsa>
diff --git a/glsa-201405-26.xml b/glsa-201405-26.xml
index daefd49e..c16762bf 100644
--- a/glsa-201405-26.xml
+++ b/glsa-201405-26.xml
@@ -6,8 +6,8 @@
X2Go Server.
</synopsis>
<product type="ebuild">x2go</product>
- <announced>May 19, 2014</announced>
- <revised>May 19, 2014: 1</revised>
+ <announced>2014-05-19</announced>
+ <revised>2014-05-19: 1</revised>
<bug>497260</bug>
<access>local</access>
<affected>
@@ -38,12 +38,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7383">CVE-2013-7383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7383">CVE-2013-7383</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Mar 2014 17:00:01 +0000">
+ <metadata tag="requester" timestamp="2014-03-04T17:00:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 May 2014 07:13:54 +0000">
+ <metadata tag="submitter" timestamp="2014-05-19T07:13:54Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201405-27.xml b/glsa-201405-27.xml
index 3da7cd08..71c5a242 100644
--- a/glsa-201405-27.xml
+++ b/glsa-201405-27.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libyaml</product>
- <announced>May 23, 2014</announced>
- <revised>May 23, 2014: 1</revised>
+ <announced>2014-05-23</announced>
+ <revised>2014-05-23: 1</revised>
<bug>505948</bug>
<access>local, remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2525">CVE-2014-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2525">CVE-2014-2525</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 03:39:38 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T03:39:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 23 May 2014 08:42:20 +0000">
+ <metadata tag="submitter" timestamp="2014-05-23T08:42:20Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201405-28.xml b/glsa-201405-28.xml
index 1469f3de..f653d89e 100644
--- a/glsa-201405-28.xml
+++ b/glsa-201405-28.xml
@@ -6,8 +6,8 @@
xmonad-contrib.
</synopsis>
<product type="ebuild">xmonad-contrib</product>
- <announced>May 28, 2014</announced>
- <revised>May 28, 2014: 1</revised>
+ <announced>2014-05-28</announced>
+ <revised>2014-05-28: 1</revised>
<bug>478288</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1436">CVE-2013-1436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1436">CVE-2013-1436</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Feb 2014 13:53:05 +0000">
+ <metadata tag="requester" timestamp="2014-02-27T13:53:05Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 May 2014 06:50:25 +0000">
+ <metadata tag="submitter" timestamp="2014-05-28T06:50:25Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201406-01.xml b/glsa-201406-01.xml
index 12036147..25d23786 100644
--- a/glsa-201406-01.xml
+++ b/glsa-201406-01.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>436028</bug>
<access>local</access>
<affected>
@@ -58,10 +58,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3524">CVE-2012-3524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3524">CVE-2012-3524</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Oct 2012 18:04:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 14:05:31 +0000">
+ <metadata tag="requester" timestamp="2012-10-14T18:04:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T14:05:31Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-02.xml b/glsa-201406-02.xml
index 6bc6ba8f..305941f9 100644
--- a/glsa-201406-02.xml
+++ b/glsa-201406-02.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>366687</bug>
<bug>463632</bug>
<access>remote</access>
@@ -51,14 +51,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4666">CVE-2010-4666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1777">CVE-2011-1777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1778">CVE-2011-1778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1779">CVE-2011-1779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0211">CVE-2013-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4666">CVE-2010-4666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1777">CVE-2011-1777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1778">CVE-2011-1778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1779">CVE-2011-1779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0211">CVE-2013-0211</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jan 2012 19:10:06 +0000">
+ <metadata tag="requester" timestamp="2012-01-22T19:10:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 15:10:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T15:10:38Z">ackle</metadata>
</glsa>
diff --git a/glsa-201406-03.xml b/glsa-201406-03.xml
index 416dffa4..afb01639 100644
--- a/glsa-201406-03.xml
+++ b/glsa-201406-03.xml
@@ -6,8 +6,8 @@
which allows remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>364883</bug>
<bug>473118</bug>
<bug>499802</bug>
@@ -50,12 +50,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5023">CVE-2009-5023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2178">CVE-2013-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7176">CVE-2013-7176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5023">CVE-2009-5023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2178">CVE-2013-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7176">CVE-2013-7176</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:06 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 15:17:17 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:06Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T15:17:17Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201406-04.xml b/glsa-201406-04.xml
index b7f6569a..de00575f 100644
--- a/glsa-201406-04.xml
+++ b/glsa-201406-04.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">systemtap</product>
- <announced>June 05, 2014</announced>
- <revised>June 05, 2014: 1</revised>
+ <announced>2014-06-05</announced>
+ <revised>2014-06-05: 1</revised>
<bug>405345</bug>
<access>local</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0875">CVE-2012-0875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0875">CVE-2012-0875</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 May 2014 22:59:45 +0000">
+ <metadata tag="requester" timestamp="2014-05-30T22:59:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Jun 2014 00:18:26 +0000">
+ <metadata tag="submitter" timestamp="2014-06-05T00:18:26Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-05.xml b/glsa-201406-05.xml
index 98bacd7c..41eccabc 100644
--- a/glsa-201406-05.xml
+++ b/glsa-201406-05.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>June 05, 2014</announced>
- <revised>June 05, 2014: 1</revised>
+ <announced>2014-06-05</announced>
+ <revised>2014-06-05: 1</revised>
<bug>504462</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0467">CVE-2014-0467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0467">CVE-2014-0467</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 03:40:42 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T03:40:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Jun 2014 00:18:36 +0000">
+ <metadata tag="submitter" timestamp="2014-06-05T00:18:36Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-06.xml b/glsa-201406-06.xml
index 57c37068..375b2426 100644
--- a/glsa-201406-06.xml
+++ b/glsa-201406-06.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">mumble</product>
- <announced>June 06, 2014</announced>
- <revised>June 06, 2014: 1</revised>
+ <announced>2014-06-06</announced>
+ <revised>2014-06-06: 1</revised>
<bug>500486</bug>
<bug>510380</bug>
<access>remote</access>
@@ -57,15 +57,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0044">CVE-2014-0044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0045">CVE-2014-0045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3755">CVE-2014-3755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3756">CVE-2014-3756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0044">CVE-2014-0044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0045">CVE-2014-0045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3755">CVE-2014-3755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3756">CVE-2014-3756</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 03:01:45 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T03:01:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jun 2014 12:14:42 +0000">
+ <metadata tag="submitter" timestamp="2014-06-06T12:14:42Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-07.xml b/glsa-201406-07.xml
index 0e5e5a16..b58ef4ff 100644
--- a/glsa-201406-07.xml
+++ b/glsa-201406-07.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">echoping</product>
- <announced>June 06, 2014</announced>
- <revised>June 06, 2014: 1</revised>
+ <announced>2014-06-06</announced>
+ <revised>2014-06-06: 1</revised>
<bug>349569</bug>
<access>remote</access>
<affected>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5111">CVE-2010-5111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5111">CVE-2010-5111</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Oct 2013 11:46:53 +0000">
+ <metadata tag="requester" timestamp="2013-10-17T11:46:53Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jun 2014 12:23:36 +0000">
+ <metadata tag="submitter" timestamp="2014-06-06T12:23:36Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201406-08.xml b/glsa-201406-08.xml
index 5d31f555..298d06ad 100644
--- a/glsa-201406-08.xml
+++ b/glsa-201406-08.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>June 10, 2014</announced>
- <revised>June 10, 2014: 1</revised>
+ <announced>2014-06-10</announced>
+ <revised>2014-06-10: 1</revised>
<bug>510278</bug>
<access>remote</access>
<affected>
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0510">CVE-2014-0510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0516">CVE-2014-0516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0517">CVE-2014-0517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0518">CVE-2014-0518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0519">CVE-2014-0519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0520">CVE-2014-0520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0510">CVE-2014-0510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0516">CVE-2014-0516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0517">CVE-2014-0517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0518">CVE-2014-0518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0519">CVE-2014-0519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0520">CVE-2014-0520</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 May 2014 09:40:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Jun 2014 09:22:32 +0000">
+ <metadata tag="requester" timestamp="2014-05-14T09:40:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-10T09:22:32Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201406-09.xml b/glsa-201406-09.xml
index 4bf458c8..427862c5 100644
--- a/glsa-201406-09.xml
+++ b/glsa-201406-09.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>June 13, 2014</announced>
- <revised>June 13, 2014: 1</revised>
+ <announced>2014-06-13</announced>
+ <revised>2014-06-13: 1</revised>
<bug>501282</bug>
<bug>503394</bug>
<bug>511840</bug>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0092">CVE-2014-0092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1959">CVE-2014-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3465">CVE-2014-3465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3466">CVE-2014-3466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0092">CVE-2014-0092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1959">CVE-2014-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3465">CVE-2014-3465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3466">CVE-2014-3466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 21:52:06 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T21:52:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Jun 2014 19:35:08 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-13T19:35:08Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-10.xml b/glsa-201406-10.xml
index efae45e5..569acafe 100644
--- a/glsa-201406-10.xml
+++ b/glsa-201406-10.xml
@@ -7,8 +7,8 @@
SQL statements.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>June 13, 2014</announced>
- <revised>June 13, 2014: 1</revised>
+ <announced>2014-06-13</announced>
+ <revised>2014-06-13: 1</revised>
<bug>392581</bug>
<bug>444179</bug>
<bug>490432</bug>
@@ -48,13 +48,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4362">CVE-2011-4362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5533">CVE-2012-5533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4508">CVE-2013-4508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4559">CVE-2013-4559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4560">CVE-2013-4560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2323">CVE-2014-2323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4362">CVE-2011-4362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5533">CVE-2012-5533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4508">CVE-2013-4508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4559">CVE-2013-4559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4560">CVE-2013-4560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2323">CVE-2014-2323</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:13:56 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Jun 2014 20:40:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:13:56Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-13T20:40:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201406-11.xml b/glsa-201406-11.xml
index d661bae5..03998477 100644
--- a/glsa-201406-11.xml
+++ b/glsa-201406-11.xml
@@ -6,8 +6,8 @@
which allow for local privilege escalation.
</synopsis>
<product type="ebuild">libXfont</product>
- <announced>June 14, 2014</announced>
- <revised>June 14, 2014: 1</revised>
+ <announced>2014-06-14</announced>
+ <revised>2014-06-14: 1</revised>
<bug>510250</bug>
<access>local, remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0209">CVE-2014-0209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0210">CVE-2014-0210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0211">CVE-2014-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0209">CVE-2014-0209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0210">CVE-2014-0210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0211">CVE-2014-0211</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 00:46:03 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T00:46:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2014 08:39:05 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-14T08:39:05Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-12.xml b/glsa-201406-12.xml
index 0ab96251..9a10f4c9 100644
--- a/glsa-201406-12.xml
+++ b/glsa-201406-12.xml
@@ -6,8 +6,8 @@
or Denial of Service by authenticated users.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>501754</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015">CVE-2014-2015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015">CVE-2014-2015</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 04:12:59 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T04:12:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:12:35 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T00:12:35Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-13.xml b/glsa-201406-13.xml
index 016c44c4..6d01442a 100644
--- a/glsa-201406-13.xml
+++ b/glsa-201406-13.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">memcached</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>279386</bug>
<bug>452098</bug>
<bug>467962</bug>
@@ -52,17 +52,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415">CVE-2009-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239">CVE-2013-7239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971">CVE-2011-4971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179">CVE-2013-0179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290">CVE-2013-7290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291">CVE-2013-7291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415">CVE-2009-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239">CVE-2013-7239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971">CVE-2011-4971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179">CVE-2013-0179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290">CVE-2013-7290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291">CVE-2013-7291</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:07:00 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:07:00Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:21:52 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T00:21:52Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201406-14.xml b/glsa-201406-14.xml
index b1f03d6b..81f6718c 100644
--- a/glsa-201406-14.xml
+++ b/glsa-201406-14.xml
@@ -6,8 +6,8 @@
which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>442044</bug>
<bug>444040</bug>
<bug>446096</bug>
@@ -50,23 +50,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6461">CVE-2012-6461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6462">CVE-2012-6462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6463">CVE-2012-6463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6464">CVE-2012-6464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6465">CVE-2012-6465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6466">CVE-2012-6466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6467">CVE-2012-6467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468">CVE-2012-6468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469">CVE-2012-6469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6470">CVE-2012-6470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6471">CVE-2012-6471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6472">CVE-2012-6472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1618">CVE-2013-1618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1637">CVE-2013-1637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1638">CVE-2013-1638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1639">CVE-2013-1639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6461">CVE-2012-6461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6462">CVE-2012-6462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6463">CVE-2012-6463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6464">CVE-2012-6464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6465">CVE-2012-6465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6466">CVE-2012-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6467">CVE-2012-6467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468">CVE-2012-6468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469">CVE-2012-6469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6470">CVE-2012-6470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6471">CVE-2012-6471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6472">CVE-2012-6472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1618">CVE-2013-1618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1637">CVE-2013-1637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1638">CVE-2013-1638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1639">CVE-2013-1639</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Nov 2012 00:45:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:23:54 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-13T00:45:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-15T00:23:54Z">ackle</metadata>
</glsa>
diff --git a/glsa-201406-15.xml b/glsa-201406-15.xml
index 55a0300e..2f0e4744 100644
--- a/glsa-201406-15.xml
+++ b/glsa-201406-15.xml
@@ -6,8 +6,8 @@
arbitrary shell commands.
</synopsis>
<product type="ebuild">kdirstat</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>504994</bug>
<access>local</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2527">CVE-2014-2527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2527">CVE-2014-2527</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2014 08:40:23 +0000">
+ <metadata tag="requester" timestamp="2014-03-21T08:40:23Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 16:22:38 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T16:22:38Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201406-16.xml b/glsa-201406-16.xml
index 648f141d..dd200184 100644
--- a/glsa-201406-16.xml
+++ b/glsa-201406-16.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">cups-filters</product>
- <announced>June 16, 2014</announced>
- <revised>June 16, 2014: 1</revised>
+ <announced>2014-06-16</announced>
+ <revised>2014-06-16: 1</revised>
<bug>504474</bug>
<bug>506518</bug>
<bug>508844</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6473">CVE-2013-6473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6474">CVE-2013-6474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6475">CVE-2013-6475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6476">CVE-2013-6476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2707">CVE-2014-2707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6473">CVE-2013-6473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6474">CVE-2013-6474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6475">CVE-2013-6475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6476">CVE-2013-6476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2707">CVE-2014-2707</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 05:04:01 +0000">
+ <metadata tag="requester" timestamp="2014-06-16T05:04:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2014 17:40:51 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-16T17:40:51Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-17.xml b/glsa-201406-17.xml
index 1bf526d7..b23ce4f8 100644
--- a/glsa-201406-17.xml
+++ b/glsa-201406-17.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>June 17, 2014</announced>
- <revised>June 17, 2014: 1</revised>
+ <announced>2014-06-17</announced>
+ <revised>2014-06-17: 1</revised>
<bug>512888</bug>
<access>remote</access>
<affected>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0531">CVE-2014-0531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0532">CVE-2014-0532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0533">CVE-2014-0533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0534">CVE-2014-0534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0535">CVE-2014-0535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0536">CVE-2014-0536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0531">CVE-2014-0531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0532">CVE-2014-0532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0533">CVE-2014-0533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0534">CVE-2014-0534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0535">CVE-2014-0535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0536">CVE-2014-0536</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 21:21:15 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jun 2014 05:52:17 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-06-10T21:21:15Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-17T05:52:17Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-18.xml b/glsa-201406-18.xml
index 9c1fb14c..e17b2f1b 100644
--- a/glsa-201406-18.xml
+++ b/glsa-201406-18.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">rxvt-unicode</product>
- <announced>June 19, 2014</announced>
- <revised>June 19, 2014: 1</revised>
+ <announced>2014-06-19</announced>
+ <revised>2014-06-19: 1</revised>
<bug>509174</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3121">CVE-2014-3121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3121">CVE-2014-3121</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 04:08:05 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T04:08:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Jun 2014 11:53:01 +0000">
+ <metadata tag="submitter" timestamp="2014-06-19T11:53:01Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-19.xml b/glsa-201406-19.xml
index 515a32e2..55e526eb 100644
--- a/glsa-201406-19.xml
+++ b/glsa-201406-19.xml
@@ -6,8 +6,8 @@
Security Service, the worst of which could lead to Denial of Service.
</synopsis>
<product type="ebuild">nss</product>
- <announced>June 21, 2014</announced>
- <revised>June 21, 2014: 1</revised>
+ <announced>2014-06-21</announced>
+ <revised>2014-06-21: 1</revised>
<bug>455558</bug>
<bug>486114</bug>
<bug>491234</bug>
@@ -51,16 +51,16 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1620">CVE-2013-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1739">CVE-2013-1739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1620">CVE-2013-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1739">CVE-2013-1739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:57:31 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:57:31Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 21 Jun 2014 21:43:15 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-21T21:43:15Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-20.xml b/glsa-201406-20.xml
index 8948d299..bebb6d08 100644
--- a/glsa-201406-20.xml
+++ b/glsa-201406-20.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>June 22, 2014</announced>
- <revised>June 22, 2014: 1</revised>
+ <announced>2014-06-22</announced>
+ <revised>2014-06-22: 1</revised>
<bug>505018</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0133">CVE-2014-0133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0133">CVE-2014-0133</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jun 2014 23:50:11 +0000">
+ <metadata tag="requester" timestamp="2014-06-18T23:50:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jun 2014 11:57:03 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-22T11:57:03Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-21.xml b/glsa-201406-21.xml
index 462ebe44..48c4999b 100644
--- a/glsa-201406-21.xml
+++ b/glsa-201406-21.xml
@@ -6,8 +6,8 @@
which could lead to man-in-the-middle attacks.
</synopsis>
<product type="ebuild">curl</product>
- <announced>June 22, 2014</announced>
- <revised>June 22, 2014: 1</revised>
+ <announced>2014-06-22</announced>
+ <revised>2014-06-22: 1</revised>
<bug>505864</bug>
<access>local, remote</access>
<affected>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0138">CVE-2014-0138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0139">CVE-2014-0139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0138">CVE-2014-0138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0139">CVE-2014-0139</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:49:53 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:49:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jun 2014 13:14:51 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-22T13:14:51Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-22.xml b/glsa-201406-22.xml
index 6ae24ef6..0b30bc08 100644
--- a/glsa-201406-22.xml
+++ b/glsa-201406-22.xml
@@ -6,8 +6,8 @@
the worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">nas</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>484480</bug>
<access>local, remote</access>
<affected>
@@ -48,11 +48,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4256">CVE-2013-4256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4258">CVE-2013-4258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4256">CVE-2013-4256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4258">CVE-2013-4258</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:31:39 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:31:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 20:32:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T20:32:15Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-23.xml b/glsa-201406-23.xml
index 5d668f12..dd457b32 100644
--- a/glsa-201406-23.xml
+++ b/glsa-201406-23.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">denyhost</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>495130</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6890">CVE-2013-6890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6890">CVE-2013-6890</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 04:56:45 +0000">
+ <metadata tag="requester" timestamp="2014-06-16T04:56:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 20:54:12 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T20:54:12Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-24.xml b/glsa-201406-24.xml
index 87a048b9..d3169765 100644
--- a/glsa-201406-24.xml
+++ b/glsa-201406-24.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>436894</bug>
<bug>453170</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411">CVE-2012-3411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198">CVE-2013-0198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411">CVE-2012-3411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198">CVE-2013-0198</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 03:08:23 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T03:08:23Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 21:36:31 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T21:36:31Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-25.xml b/glsa-201406-25.xml
index 9ede4e0e..9a72cd1b 100644
--- a/glsa-201406-25.xml
+++ b/glsa-201406-25.xml
@@ -7,8 +7,8 @@
shell commands.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 2</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 2</revised>
<bug>513102</bug>
<access>remote</access>
<affected>
@@ -52,11 +52,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4046">CVE-2014-4046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4047">CVE-2014-4047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4046">CVE-2014-4046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4047">CVE-2014-4047</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jun 2014 02:00:18 +0000">
+ <metadata tag="requester" timestamp="2014-06-24T02:00:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 21:51:56 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T21:51:56Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-26.xml b/glsa-201406-26.xml
index c975b16e..98c3afdf 100644
--- a/glsa-201406-26.xml
+++ b/glsa-201406-26.xml
@@ -6,8 +6,8 @@
may allow a remote attacker to execute code.
</synopsis>
<product type="ebuild">django</product>
- <announced>June 26, 2014</announced>
- <revised>December 03, 2014: 2</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-12-03: 2</revised>
<bug>508514</bug>
<bug>510382</bug>
<access>remote</access>
@@ -61,15 +61,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0472">CVE-2014-0472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0473">CVE-2014-0473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0474">CVE-2014-0474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1418">CVE-2014-1418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0472">CVE-2014-0472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0473">CVE-2014-0473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0474">CVE-2014-0474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1418">CVE-2014-1418</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 May 2014 18:37:13 +0000">
+ <metadata tag="requester" timestamp="2014-05-02T18:37:13Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 03 Dec 2014 01:03:38 +0000">
+ <metadata tag="submitter" timestamp="2014-12-03T01:03:38Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-27.xml b/glsa-201406-27.xml
index b066f411..eb4521c6 100644
--- a/glsa-201406-27.xml
+++ b/glsa-201406-27.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">polkit spice-gtk systemd hplip libvirt</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>484486</bug>
<bug>484488</bug>
<bug>485420</bug>
@@ -92,14 +92,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4288">CVE-2013-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4311">CVE-2013-4311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4324">CVE-2013-4324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4325">CVE-2013-4325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4327">CVE-2013-4327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4288">CVE-2013-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4311">CVE-2013-4311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4324">CVE-2013-4324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4325">CVE-2013-4325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4327">CVE-2013-4327</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:18:50 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jun 2014 22:23:13 +0000">
+ <metadata tag="requester" timestamp="2013-09-29T15:18:50Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-26T22:23:13Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201406-28.xml b/glsa-201406-28.xml
index b9c461c0..81d8862a 100644
--- a/glsa-201406-28.xml
+++ b/glsa-201406-28.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>439052</bug>
<bug>452202</bug>
<bug>470734</bug>
@@ -50,32 +50,31 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
</references>
-<metadata tag="requester" timestamp="Sat, 01 Dec 2012 19:41:59 +0000">ackle</metadata>
-<metadata tag="submitter" timestamp="Thu, 26 Jun 2014 23:11:02 +0000">ackle</metadata>
+<metadata tag="requester" timestamp="2012-12-01T19:41:59Z">ackle</metadata>
+<metadata tag="submitter" timestamp="2014-06-26T23:11:02Z">ackle</metadata>
</glsa>
-
diff --git a/glsa-201406-29.xml b/glsa-201406-29.xml
index 06761c76..e5b4a4b5 100644
--- a/glsa-201406-29.xml
+++ b/glsa-201406-29.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">spice-gtk</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>435694</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4425">CVE-2012-4425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4425">CVE-2012-4425</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:53:39 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jun 2014 23:23:49 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:53:39Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-26T23:23:49Z">ackle</metadata>
</glsa>
-
diff --git a/glsa-201406-30.xml b/glsa-201406-30.xml
index 240c04bf..595d1915 100644
--- a/glsa-201406-30.xml
+++ b/glsa-201406-30.xml
@@ -6,8 +6,8 @@
gain elevated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 27, 2014</announced>
- <revised>June 27, 2014: 1</revised>
+ <announced>2014-06-27</announced>
+ <revised>2014-06-27: 1</revised>
<bug>503586</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0106">CVE-2014-0106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0106">CVE-2014-0106</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jun 2014 23:56:18 +0000">
+ <metadata tag="requester" timestamp="2014-06-18T23:56:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2014 08:30:38 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-27T08:30:38Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-31.xml b/glsa-201406-31.xml
index ac904ff1..fcb30f21 100644
--- a/glsa-201406-31.xml
+++ b/glsa-201406-31.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">konqueror</product>
- <announced>June 27, 2014</announced>
- <revised>June 27, 2014: 1</revised>
+ <announced>2014-06-27</announced>
+ <revised>2014-06-27: 1</revised>
<bug>438452</bug>
<access>remote</access>
<affected>
@@ -47,11 +47,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4512">CVE-2012-4512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4513">CVE-2012-4513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4514">CVE-2012-4514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4515">CVE-2012-4515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4512">CVE-2012-4512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4513">CVE-2012-4513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4514">CVE-2012-4514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4515">CVE-2012-4515</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Dec 2012 14:03:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2014 14:04:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-01T14:03:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-27T14:04:10Z">ackle</metadata>
</glsa>
diff --git a/glsa-201406-32.xml b/glsa-201406-32.xml
index 7f077e2a..f64277d0 100644
--- a/glsa-201406-32.xml
+++ b/glsa-201406-32.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">icedtea-bin</product>
- <announced>June 29, 2014</announced>
- <revised>April 19, 2016: 2</revised>
+ <announced>2014-06-29</announced>
+ <revised>2016-04-19: 2</revised>
<bug>312297</bug>
<bug>330205</bug>
<bug>340819</bug>
@@ -69,237 +69,237 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548">CVE-2010-2548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783">CVE-2010-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564">CVE-2010-3564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860">CVE-2010-3860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351">CVE-2010-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025">CVE-2011-0025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706">CVE-2011-0706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822">CVE-2011-0822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870">CVE-2011-0870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571">CVE-2011-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422">CVE-2012-3422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423">CVE-2012-3423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540">CVE-2012-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979">CVE-2012-5979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424">CVE-2013-0424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425">CVE-2013-0425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426">CVE-2013-0426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427">CVE-2013-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428">CVE-2013-0428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429">CVE-2013-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431">CVE-2013-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432">CVE-2013-0432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433">CVE-2013-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434">CVE-2013-0434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435">CVE-2013-0435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440">CVE-2013-0440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441">CVE-2013-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442">CVE-2013-0442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443">CVE-2013-0443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444">CVE-2013-0444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450">CVE-2013-0450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475">CVE-2013-1475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476">CVE-2013-1476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478">CVE-2013-1478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480">CVE-2013-1480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002">CVE-2013-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954">CVE-2013-6954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876">CVE-2014-1876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548">CVE-2010-2548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783">CVE-2010-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564">CVE-2010-3564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860">CVE-2010-3860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351">CVE-2010-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025">CVE-2011-0025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706">CVE-2011-0706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822">CVE-2011-0822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870">CVE-2011-0870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571">CVE-2011-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422">CVE-2012-3422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423">CVE-2012-3423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540">CVE-2012-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979">CVE-2012-5979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424">CVE-2013-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425">CVE-2013-0425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426">CVE-2013-0426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427">CVE-2013-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428">CVE-2013-0428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429">CVE-2013-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431">CVE-2013-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432">CVE-2013-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433">CVE-2013-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434">CVE-2013-0434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435">CVE-2013-0435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440">CVE-2013-0440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441">CVE-2013-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442">CVE-2013-0442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443">CVE-2013-0443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444">CVE-2013-0444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450">CVE-2013-0450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475">CVE-2013-1475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476">CVE-2013-1476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478">CVE-2013-1478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480">CVE-2013-1480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002">CVE-2013-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954">CVE-2013-6954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876">CVE-2014-1876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:56 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:56Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Apr 2016 21:29:08 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-04-19T21:29:08Z">craig</metadata>
</glsa>
diff --git a/glsa-201406-33.xml b/glsa-201406-33.xml
index 922f532b..6647cb57 100644
--- a/glsa-201406-33.xml
+++ b/glsa-201406-33.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 29, 2014</announced>
- <revised>June 29, 2014: 1</revised>
+ <announced>2014-06-29</announced>
+ <revised>2014-06-29: 1</revised>
<bug>503792</bug>
<bug>507298</bug>
<bug>508506</bug>
@@ -53,18 +53,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2281">CVE-2014-2281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2282">CVE-2014-2282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2283">CVE-2014-2283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2299">CVE-2014-2299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2907">CVE-2014-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4020">CVE-2014-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4174">CVE-2014-4174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2281">CVE-2014-2281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2282">CVE-2014-2282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2283">CVE-2014-2283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2299">CVE-2014-2299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2907">CVE-2014-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4020">CVE-2014-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4174">CVE-2014-4174</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 22:48:06 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T22:48:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Jun 2014 15:53:26 +0000">
+ <metadata tag="submitter" timestamp="2014-06-29T15:53:26Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201406-34.xml b/glsa-201406-34.xml
index c530ef8b..32bca1fd 100644
--- a/glsa-201406-34.xml
+++ b/glsa-201406-34.xml
@@ -6,8 +6,8 @@
worst of which could lead to man-in-the-middle attacks.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>June 29, 2014</announced>
- <revised>June 29, 2014: 1</revised>
+ <announced>2014-06-29</announced>
+ <revised>2014-06-29: 1</revised>
<bug>358025</bug>
<bug>384227</bug>
<bug>469140</bug>
@@ -50,13 +50,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1094">CVE-2011-1094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2074">CVE-2013-2074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3494">CVE-2014-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1094">CVE-2011-1094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2074">CVE-2013-2074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3494">CVE-2014-3494</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:43:30 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:43:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Jun 2014 20:18:59 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-29T20:18:59Z">K_F</metadata>
</glsa>
diff --git a/glsa-201406-35.xml b/glsa-201406-35.xml
index a5f61126..ce63c6c3 100644
--- a/glsa-201406-35.xml
+++ b/glsa-201406-35.xml
@@ -6,8 +6,8 @@
which could lead to a Denial of Service condition.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>June 30, 2014</announced>
- <revised>June 30, 2014: 1</revised>
+ <announced>2014-06-30</announced>
+ <revised>2014-06-30: 1</revised>
<bug>266129</bug>
<bug>507242</bug>
<access>remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1595">CVE-2009-1595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1596">CVE-2009-1596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2741">CVE-2014-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1595">CVE-2009-1595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1596">CVE-2009-1596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2741">CVE-2014-2741</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:12:58 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:12:58Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jun 2014 17:52:11 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-30T17:52:11Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201406-36.xml b/glsa-201406-36.xml
index 2d04362c..c6ab249f 100644
--- a/glsa-201406-36.xml
+++ b/glsa-201406-36.xml
@@ -6,8 +6,8 @@
Denial of Service or a man-in-the-middle attack.
</synopsis>
<product type="ebuild">OpenLDAP</product>
- <announced>June 30, 2014</announced>
- <revised>June 30, 2014: 1</revised>
+ <announced>2014-06-30</announced>
+ <revised>2014-06-30: 1</revised>
<bug>290345</bug>
<bug>323777</bug>
<bug>355333</bug>
@@ -48,18 +48,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767">CVE-2009-3767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0211">CVE-2010-0211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0212">CVE-2010-0212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1024">CVE-2011-1024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1025">CVE-2011-1025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1081">CVE-2011-1081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4079">CVE-2011-4079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164">CVE-2012-1164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2668">CVE-2012-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767">CVE-2009-3767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0211">CVE-2010-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0212">CVE-2010-0212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1024">CVE-2011-1024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1025">CVE-2011-1025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1081">CVE-2011-1081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4079">CVE-2011-4079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164">CVE-2012-1164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2668">CVE-2012-2668</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jun 2014 19:44:53 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-30T19:44:53Z">craig</metadata>
</glsa>
diff --git a/glsa-201407-01.xml b/glsa-201407-01.xml
index f6601da5..8c03385d 100644
--- a/glsa-201407-01.xml
+++ b/glsa-201407-01.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>July 07, 2014</announced>
- <revised>July 07, 2014: 1</revised>
+ <announced>2014-07-07</announced>
+ <revised>2014-07-07: 1</revised>
<bug>492876</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6411">CVE-2013-6411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6411">CVE-2013-6411</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:41:36 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:41:36Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2014 16:03:44 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-07-07T16:03:44Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201407-02.xml b/glsa-201407-02.xml
index bf039ef9..00de5462 100644
--- a/glsa-201407-02.xml
+++ b/glsa-201407-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>July 09, 2014</announced>
- <revised>July 09, 2014: 1</revised>
+ <announced>2014-07-09</announced>
+ <revised>2014-07-09: 1</revised>
<bug>516750</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537">CVE-2014-0537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539">CVE-2014-0539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671">CVE-2014-4671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537">CVE-2014-0537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539">CVE-2014-0539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671">CVE-2014-4671</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Jul 2014 12:42:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jul 2014 13:23:49 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-07-09T12:42:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-07-09T13:23:49Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201407-03.xml b/glsa-201407-03.xml
index a28279d4..68bf7456 100644
--- a/glsa-201407-03.xml
+++ b/glsa-201407-03.xml
@@ -6,8 +6,8 @@
could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">xen</product>
- <announced>July 16, 2014</announced>
- <revised>July 16, 2014: 1</revised>
+ <announced>2014-07-16</announced>
+ <revised>2014-07-16: 1</revised>
<bug>440768</bug>
<bug>484478</bug>
<bug>486354</bug>
@@ -105,41 +105,41 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442">CVE-2013-1442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329">CVE-2013-4329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355">CVE-2013-4355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356">CVE-2013-4356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361">CVE-2013-4361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368">CVE-2013-4368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369">CVE-2013-4369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370">CVE-2013-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371">CVE-2013-4371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375">CVE-2013-4375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416">CVE-2013-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494">CVE-2013-4494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551">CVE-2013-4551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553">CVE-2013-4553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554">CVE-2013-4554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375">CVE-2013-6375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400">CVE-2013-6400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642">CVE-2014-1642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666">CVE-2014-1666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891">CVE-2014-1891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892">CVE-2014-1892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893">CVE-2014-1893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894">CVE-2014-1894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895">CVE-2014-1895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896">CVE-2014-1896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599">CVE-2014-2599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124">CVE-2014-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021">CVE-2014-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442">CVE-2013-1442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329">CVE-2013-4329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355">CVE-2013-4355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356">CVE-2013-4356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361">CVE-2013-4361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368">CVE-2013-4368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369">CVE-2013-4369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370">CVE-2013-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371">CVE-2013-4371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375">CVE-2013-4375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416">CVE-2013-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494">CVE-2013-4494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551">CVE-2013-4551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553">CVE-2013-4553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554">CVE-2013-4554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375">CVE-2013-6375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400">CVE-2013-6400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642">CVE-2014-1642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666">CVE-2014-1666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891">CVE-2014-1891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892">CVE-2014-1892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893">CVE-2014-1893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894">CVE-2014-1894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895">CVE-2014-1895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896">CVE-2014-1896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599">CVE-2014-2599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124">CVE-2014-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021">CVE-2014-4021</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 02:43:17 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T02:43:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Jul 2014 16:10:46 +0000">
+ <metadata tag="submitter" timestamp="2014-07-16T16:10:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201407-04.xml b/glsa-201407-04.xml
index 4c6aae84..bed6f487 100644
--- a/glsa-201407-04.xml
+++ b/glsa-201407-04.xml
@@ -4,8 +4,8 @@
<title>GnuPG: Denial of Service</title>
<synopsis>A vulnerability in GnuPG can lead to a Denial of Service condition.</synopsis>
<product type="ebuild">GnuPG. </product>
- <announced>July 16, 2014</announced>
- <revised>July 16, 2014: 1</revised>
+ <announced>2014-07-16</announced>
+ <revised>2014-07-16: 1</revised>
<bug>514718</bug>
<access>local, remote</access>
<affected>
@@ -51,8 +51,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4617">CVE-2014-4617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4617">CVE-2014-4617</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jul 2014 11:31:33 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Jul 2014 16:57:44 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-07-05T11:31:33Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-07-16T16:57:44Z">K_F</metadata>
</glsa>
diff --git a/glsa-201407-05.xml b/glsa-201407-05.xml
index 7d7f83ff..d5b487a6 100644
--- a/glsa-201407-05.xml
+++ b/glsa-201407-05.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>July 27, 2014</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2014-07-27</announced>
+ <revised>2015-06-06: 2</revised>
<bug>512506</bug>
<access>remote</access>
<affected>
@@ -68,20 +68,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298">CVE-2010-5298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195">CVE-2014-0195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198">CVE-2014-0198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221">CVE-2014-0221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224">CVE-2014-0224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470">CVE-2014-3470</uri>
- <uri link="http://www.openssl.org/news/secadv_20140605.txt">OpenSSL
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298">CVE-2010-5298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195">CVE-2014-0195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198">CVE-2014-0198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221">CVE-2014-0221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224">CVE-2014-0224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470">CVE-2014-3470</uri>
+ <uri link="https://www.openssl.org/news/secadv_20140605.txt">OpenSSL
Security Advisory [05 Jun 2014]
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Jun 2014 10:20:51 +0000">
+ <metadata tag="requester" timestamp="2014-06-06T10:20:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:12:08 +0000">
+ <metadata tag="submitter" timestamp="2015-06-06T23:12:08Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201408-01.xml b/glsa-201408-01.xml
index 073a414f..b0cefd19 100644
--- a/glsa-201408-01.xml
+++ b/glsa-201408-01.xml
@@ -6,8 +6,8 @@
inject SQL commands.
</synopsis>
<product type="ebuild">ZendFramework</product>
- <announced>August 04, 2014</announced>
- <revised>August 04, 2014: 1</revised>
+ <announced>2014-08-04</announced>
+ <revised>2014-08-04: 1</revised>
<bug>369139</bug>
<access>remote</access>
<affected>
@@ -50,8 +50,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1939">CVE-2011-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1939">CVE-2011-1939</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 21:42:50 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Aug 2014 09:08:18 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T21:42:50Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-08-04T09:08:18Z">K_F</metadata>
</glsa>
diff --git a/glsa-201408-02.xml b/glsa-201408-02.xml
index 364a6024..b77f91fd 100644
--- a/glsa-201408-02.xml
+++ b/glsa-201408-02.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>August 09, 2014</announced>
- <revised>August 09, 2014: 1</revised>
+ <announced>2014-08-09</announced>
+ <revised>2014-08-09: 1</revised>
<bug>504088</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2240">CVE-2014-2240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2240">CVE-2014-2240</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2014 20:29:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Aug 2014 19:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-07-15T20:29:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-09T19:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-03.xml b/glsa-201408-03.xml
index f3033f3a..397b576d 100644
--- a/glsa-201408-03.xml
+++ b/glsa-201408-03.xml
@@ -6,8 +6,8 @@
information.
</synopsis>
<product type="ebuild">libssh</product>
- <announced>August 10, 2014</announced>
- <revised>August 10, 2014: 1</revised>
+ <announced>2014-08-10</announced>
+ <revised>2014-08-10: 1</revised>
<bug>503504</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0017">CVE-2014-0017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0017">CVE-2014-0017</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:25:42 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:25:42Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Aug 2014 16:35:47 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-10T16:35:47Z">K_F</metadata>
</glsa>
diff --git a/glsa-201408-04.xml b/glsa-201408-04.xml
index 1e2d7668..9ad1498d 100644
--- a/glsa-201408-04.xml
+++ b/glsa-201408-04.xml
@@ -6,8 +6,8 @@
attackers to escalate their privileges.
</synopsis>
<product type="ebuild">catfish</product>
- <announced>August 13, 2014</announced>
- <revised>August 13, 2014: 1</revised>
+ <announced>2014-08-13</announced>
+ <revised>2014-08-13: 1</revised>
<bug>502536</bug>
<access>local</access>
<affected>
@@ -42,13 +42,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2093">CVE-2014-2093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2094">CVE-2014-2094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2095">CVE-2014-2095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2096">CVE-2014-2096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2093">CVE-2014-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2094">CVE-2014-2094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2095">CVE-2014-2095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2096">CVE-2014-2096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Aug 2014 18:47:34 +0000">
+ <metadata tag="requester" timestamp="2014-08-02T18:47:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Aug 2014 18:12:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-13T18:12:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-05.xml b/glsa-201408-05.xml
index 27382841..a4b0236e 100644
--- a/glsa-201408-05.xml
+++ b/glsa-201408-05.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>August 14, 2014</announced>
- <revised>August 14, 2014: 1</revised>
+ <announced>2014-08-14</announced>
+ <revised>2014-08-14: 1</revised>
<bug>519790</bug>
<access>remote</access>
<affected>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0540">CVE-2014-0540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0541">CVE-2014-0541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0542">CVE-2014-0542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0543">CVE-2014-0543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0544">CVE-2014-0544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0545">CVE-2014-0545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0540">CVE-2014-0540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0541">CVE-2014-0541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0542">CVE-2014-0542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0543">CVE-2014-0543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0544">CVE-2014-0544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0545">CVE-2014-0545</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Aug 2014 13:32:27 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Aug 2014 13:09:44 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-08-13T13:32:27Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-14T13:09:44Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-06.xml b/glsa-201408-06.xml
index ade917ff..8b2df195 100644
--- a/glsa-201408-06.xml
+++ b/glsa-201408-06.xml
@@ -6,8 +6,8 @@
allow a remote attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>August 14, 2014</announced>
- <revised>June 06, 2015: 4</revised>
+ <announced>2014-08-14</announced>
+ <revised>2015-06-06: 4</revised>
<bug>503014</bug>
<bug>507378</bug>
<access>remote</access>
@@ -72,14 +72,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7353">CVE-2013-7353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7354">CVE-2013-7354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0333">CVE-2014-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7353">CVE-2013-7353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7354">CVE-2013-7354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0333">CVE-2014-0333</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 04:38:43 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T04:38:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:44:55 +0000">
+ <metadata tag="submitter" timestamp="2015-06-06T23:44:55Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201408-07.xml b/glsa-201408-07.xml
index 0be0b646..6b0d248a 100644
--- a/glsa-201408-07.xml
+++ b/glsa-201408-07.xml
@@ -8,8 +8,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">modplug</product>
- <announced>August 16, 2014</announced>
- <revised>August 16, 2014: 1</revised>
+ <announced>2014-08-16</announced>
+ <revised>2014-08-16: 1</revised>
<bug>480388</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4233">CVE-2013-4233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4234">CVE-2013-4234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4233">CVE-2013-4233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4234">CVE-2013-4234</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Aug 2014 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2014-08-15T23:38:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Aug 2014 17:57:57 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-16T17:57:57Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-08.xml b/glsa-201408-08.xml
index 0b7353f9..f76bf565 100644
--- a/glsa-201408-08.xml
+++ b/glsa-201408-08.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service. </synopsis>
<product type="ebuild">file</product>
- <announced>August 26, 2014</announced>
- <revised>August 29, 2014: 6</revised>
+ <announced>2014-08-26</announced>
+ <revised>2014-08-29: 6</revised>
<bug>505534</bug>
<access>local, remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 21:48:15 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T21:48:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 12:33:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T12:33:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-09.xml b/glsa-201408-09.xml
index bd816c0d..09a59b1c 100644
--- a/glsa-201408-09.xml
+++ b/glsa-201408-09.xml
@@ -7,8 +7,8 @@
Service condition.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>511536</bug>
<access>local, remote</access>
<affected>
@@ -47,10 +47,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3467">CVE-2014-3467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3468">CVE-2014-3468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3469">CVE-2014-3469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3467">CVE-2014-3467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3468">CVE-2014-3468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3469">CVE-2014-3469</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 17:44:50 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 09:17:19 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-06-17T17:44:50Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T09:17:19Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-10.xml b/glsa-201408-10.xml
index bc5f023b..66cab7ca 100644
--- a/glsa-201408-10.xml
+++ b/glsa-201408-10.xml
@@ -6,8 +6,8 @@
extract ElGamal private key information.
</synopsis>
<product type="ebuild">libgcrypt,side-channel,elgamal</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>519396</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5270">CVE-2014-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5270">CVE-2014-5270</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Aug 2014 09:53:40 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 10:08:01 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-08-24T09:53:40Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T10:08:01Z">K_F</metadata>
</glsa>
diff --git a/glsa-201408-11.xml b/glsa-201408-11.xml
index 882adbbe..21332284 100644
--- a/glsa-201408-11.xml
+++ b/glsa-201408-11.xml
@@ -6,8 +6,8 @@
which could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>August 29, 2014</announced>
- <revised>August 22, 2015: 4</revised>
+ <announced>2014-08-29</announced>
+ <revised>2015-08-22: 4</revised>
<bug>459904</bug>
<bug>472204</bug>
<bug>472558</bug>
@@ -101,37 +101,37 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718">CVE-2011-4718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635">CVE-2013-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643">CVE-2013-1643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824">CVE-2013-1824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110">CVE-2013-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735">CVE-2013-3735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113">CVE-2013-4113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248">CVE-2013-4248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635">CVE-2013-4635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636">CVE-2013-4636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420">CVE-2013-6420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712">CVE-2013-6712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226">CVE-2013-7226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327">CVE-2013-7327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185">CVE-2014-0185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237">CVE-2014-0237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238">CVE-2014-0238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497">CVE-2014-2497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597">CVE-2014-3597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981">CVE-2014-3981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049">CVE-2014-4049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670">CVE-2014-4670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120">CVE-2014-5120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718">CVE-2011-4718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635">CVE-2013-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643">CVE-2013-1643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824">CVE-2013-1824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110">CVE-2013-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735">CVE-2013-3735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113">CVE-2013-4113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248">CVE-2013-4248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635">CVE-2013-4635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636">CVE-2013-4636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420">CVE-2013-6420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712">CVE-2013-6712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226">CVE-2013-7226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327">CVE-2013-7327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185">CVE-2014-0185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237">CVE-2014-0237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238">CVE-2014-0238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497">CVE-2014-2497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597">CVE-2014-3597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981">CVE-2014-3981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049">CVE-2014-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670">CVE-2014-4670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120">CVE-2014-5120</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:19:36 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:19:36Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:25:57 +0000">
+ <metadata tag="submitter" timestamp="2015-08-22T22:25:57Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201408-12.xml b/glsa-201408-12.xml
index 4dae67c5..b8dcfb7d 100644
--- a/glsa-201408-12.xml
+++ b/glsa-201408-12.xml
@@ -7,8 +7,8 @@
Denial of Service condition
</synopsis>
<product type="ebuild">apache,dos,ace</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>504990</bug>
<bug>507866</bug>
<bug>517298</bug>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6438">CVE-2013-6438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0098">CVE-2014-0098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6438">CVE-2013-6438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0098">CVE-2014-0098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 22:08:40 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T22:08:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 10:56:11 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T10:56:11Z">K_F</metadata>
</glsa>
diff --git a/glsa-201408-13.xml b/glsa-201408-13.xml
index c9b4c249..5f85b849 100644
--- a/glsa-201408-13.xml
+++ b/glsa-201408-13.xml
@@ -6,8 +6,8 @@
attackers to escalate their privileges.
</synopsis>
<product type="ebuild">jinja</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>497690</bug>
<access>local</access>
<affected>
@@ -42,11 +42,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0012">CVE-2014-0012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1402">CVE-2014-1402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0012">CVE-2014-0012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1402">CVE-2014-1402</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Aug 2014 05:23:15 +0000">
+ <metadata tag="requester" timestamp="2014-08-19T05:23:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 18:36:00 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T18:36:00Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201408-14.xml b/glsa-201408-14.xml
index 94790195..bb406e19 100644
--- a/glsa-201408-14.xml
+++ b/glsa-201408-14.xml
@@ -6,8 +6,8 @@
access to private key information.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>503506</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0016">CVE-2014-0016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0016">CVE-2014-0016</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 22:44:37 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T22:44:37Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 18:54:29 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T18:54:29Z">K_F</metadata>
</glsa>
diff --git a/glsa-201408-15.xml b/glsa-201408-15.xml
index 517ed5c8..0ca39d89 100644
--- a/glsa-201408-15.xml
+++ b/glsa-201408-15.xml
@@ -6,8 +6,8 @@
of which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">postgresql-server</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>456080</bug>
<bug>463884</bug>
<bug>501946</bug>
@@ -79,19 +79,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0255">CVE-2013-0255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1899">CVE-2013-1899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1900">CVE-2013-1900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1901">CVE-2013-1901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0060">CVE-2014-0060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0061">CVE-2014-0061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0062">CVE-2014-0062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0063">CVE-2014-0063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0064">CVE-2014-0064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0065">CVE-2014-0065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0066">CVE-2014-0066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2669">CVE-2014-2669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0255">CVE-2013-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1899">CVE-2013-1899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1900">CVE-2013-1900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1901">CVE-2013-1901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0060">CVE-2014-0060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0061">CVE-2014-0061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0062">CVE-2014-0062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0063">CVE-2014-0063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0064">CVE-2014-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0065">CVE-2014-0065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0066">CVE-2014-0066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2669">CVE-2014-2669</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Apr 2013 20:45:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 23:33:40 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-10T20:45:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T23:33:40Z">ackle</metadata>
</glsa>
diff --git a/glsa-201408-16.xml b/glsa-201408-16.xml
index 0609f17e..4bcf43bc 100644
--- a/glsa-201408-16.xml
+++ b/glsa-201408-16.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>August 30, 2014</announced>
- <revised>August 30, 2014: 1</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-08-30: 1</revised>
<bug>504328</bug>
<bug>504890</bug>
<bug>507212</bug>
@@ -54,70 +54,70 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1741">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1741">
CVE-2014-1741
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1700">CVE-2014-1700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1701">CVE-2014-1701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1702">CVE-2014-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1703">CVE-2014-1703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1704">CVE-2014-1704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1705">CVE-2014-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1713">CVE-2014-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1714">CVE-2014-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1715">CVE-2014-1715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1716">CVE-2014-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1717">CVE-2014-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1718">CVE-2014-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1719">CVE-2014-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1720">CVE-2014-1720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1721">CVE-2014-1721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1722">CVE-2014-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1723">CVE-2014-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1724">CVE-2014-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1725">CVE-2014-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1726">CVE-2014-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1727">CVE-2014-1727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1728">CVE-2014-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1729">CVE-2014-1729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1730">CVE-2014-1730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1731">CVE-2014-1731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1732">CVE-2014-1732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1733">CVE-2014-1733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1734">CVE-2014-1734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1735">CVE-2014-1735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1740">CVE-2014-1740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1742">CVE-2014-1742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1743">CVE-2014-1743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1744">CVE-2014-1744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1745">CVE-2014-1745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1746">CVE-2014-1746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1747">CVE-2014-1747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1748">CVE-2014-1748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1749">CVE-2014-1749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3154">CVE-2014-3154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3155">CVE-2014-3155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3156">CVE-2014-3156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3157">CVE-2014-3157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3160">CVE-2014-3160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3162">CVE-2014-3162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3165">CVE-2014-3165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3166">CVE-2014-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3167">CVE-2014-3167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3168">CVE-2014-3168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3169">CVE-2014-3169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3170">CVE-2014-3170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3171">CVE-2014-3171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3172">CVE-2014-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3173">CVE-2014-3173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3174">CVE-2014-3174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3175">CVE-2014-3175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3176">CVE-2014-3176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3177">CVE-2014-3177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1700">CVE-2014-1700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1701">CVE-2014-1701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1702">CVE-2014-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1703">CVE-2014-1703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1704">CVE-2014-1704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1705">CVE-2014-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1713">CVE-2014-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1714">CVE-2014-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1715">CVE-2014-1715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1716">CVE-2014-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1717">CVE-2014-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1718">CVE-2014-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1719">CVE-2014-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1720">CVE-2014-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1721">CVE-2014-1721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1722">CVE-2014-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1723">CVE-2014-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1724">CVE-2014-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1725">CVE-2014-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1726">CVE-2014-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1727">CVE-2014-1727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1728">CVE-2014-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1729">CVE-2014-1729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1730">CVE-2014-1730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1731">CVE-2014-1731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1732">CVE-2014-1732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1733">CVE-2014-1733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1734">CVE-2014-1734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1735">CVE-2014-1735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1740">CVE-2014-1740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1742">CVE-2014-1742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1743">CVE-2014-1743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1744">CVE-2014-1744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1745">CVE-2014-1745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1746">CVE-2014-1746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1747">CVE-2014-1747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1748">CVE-2014-1748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1749">CVE-2014-1749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3154">CVE-2014-3154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3155">CVE-2014-3155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3156">CVE-2014-3156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3157">CVE-2014-3157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3160">CVE-2014-3160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3162">CVE-2014-3162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3165">CVE-2014-3165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3166">CVE-2014-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3167">CVE-2014-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3168">CVE-2014-3168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3169">CVE-2014-3169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3170">CVE-2014-3170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3171">CVE-2014-3171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3172">CVE-2014-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3173">CVE-2014-3173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3174">CVE-2014-3174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3175">CVE-2014-3175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3176">CVE-2014-3176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3177">CVE-2014-3177</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Mar 2014 12:20:02 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Aug 2014 00:34:13 +0000">
+ <metadata tag="requester" timestamp="2014-03-20T12:20:02Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-30T00:34:13Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201408-17.xml b/glsa-201408-17.xml
index b0434457..048cf72f 100644
--- a/glsa-201408-17.xml
+++ b/glsa-201408-17.xml
@@ -6,8 +6,8 @@
allows local attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>August 30, 2014</announced>
- <revised>September 02, 2014: 3</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-09-02: 3</revised>
<bug>201434</bug>
<bug>486352</bug>
<bug>505946</bug>
@@ -50,25 +50,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6227">CVE-2007-6227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4377">CVE-2013-4377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4544">CVE-2013-4544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0142">CVE-2014-0142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0143">CVE-2014-0143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0144">CVE-2014-0144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0145">CVE-2014-0145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0146">CVE-2014-0146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0147">CVE-2014-0147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0150">CVE-2014-0150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0222">CVE-2014-0222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0223">CVE-2014-0223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2894">CVE-2014-2894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3461">CVE-2014-3461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6227">CVE-2007-6227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4377">CVE-2013-4377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4544">CVE-2013-4544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0142">CVE-2014-0142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0143">CVE-2014-0143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0144">CVE-2014-0144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0145">CVE-2014-0145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0146">CVE-2014-0146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0147">CVE-2014-0147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0150">CVE-2014-0150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0222">CVE-2014-0222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0223">CVE-2014-0223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2894">CVE-2014-2894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3461">CVE-2014-3461</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2014 02:33:03 +0000">
+ <metadata tag="requester" timestamp="2014-06-14T02:33:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Sep 2014 09:23:53 +0000">
+ <metadata tag="submitter" timestamp="2014-09-02T09:23:53Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201408-18.xml b/glsa-201408-18.xml
index c490581e..0e7f5321 100644
--- a/glsa-201408-18.xml
+++ b/glsa-201408-18.xml
@@ -6,8 +6,8 @@
which can allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nrpe</product>
- <announced>August 30, 2014</announced>
- <revised>August 30, 2014: 1</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-08-30: 1</revised>
<bug>397603</bug>
<bug>459870</bug>
<bug>508122</bug>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1362">CVE-2013-1362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2913">CVE-2014-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1362">CVE-2013-1362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2913">CVE-2014-2913</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Sep 2012 17:08:14 +0000">
+ <metadata tag="requester" timestamp="2012-09-21T17:08:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Aug 2014 01:17:35 +0000">
+ <metadata tag="submitter" timestamp="2014-08-30T01:17:35Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201408-19.xml b/glsa-201408-19.xml
index 48eb1150..b38a0ff5 100644
--- a/glsa-201408-19.xml
+++ b/glsa-201408-19.xml
@@ -6,8 +6,8 @@
LibreOffice, the worst of which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>August 31, 2014</announced>
- <revised>August 31, 2014: 1</revised>
+ <announced>2014-08-31</announced>
+ <revised>2014-08-31: 1</revised>
<bug>283370</bug>
<bug>305195</bug>
<bug>320491</bug>
@@ -88,33 +88,33 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339">CVE-2006-4339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200">CVE-2009-0200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201">CVE-2009-0201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949">CVE-2009-2949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950">CVE-2009-2950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301">CVE-2009-3301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302">CVE-2009-3302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395">CVE-2010-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935">CVE-2010-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936">CVE-2010-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450">CVE-2010-3450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451">CVE-2010-3451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452">CVE-2010-3452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453">CVE-2010-3453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454">CVE-2010-3454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689">CVE-2010-3689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253">CVE-2010-4253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643">CVE-2010-4643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149">CVE-2012-2149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334">CVE-2012-2334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247">CVE-2014-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200">CVE-2009-0200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201">CVE-2009-0201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949">CVE-2009-2949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950">CVE-2009-2950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301">CVE-2009-3301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302">CVE-2009-3302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395">CVE-2010-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935">CVE-2010-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936">CVE-2010-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450">CVE-2010-3450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451">CVE-2010-3451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452">CVE-2010-3452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453">CVE-2010-3453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454">CVE-2010-3454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689">CVE-2010-3689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253">CVE-2010-4253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643">CVE-2010-4643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149">CVE-2012-2149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334">CVE-2012-2334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247">CVE-2014-0247</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 Aug 2014 14:48:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-08-31T14:48:34Z">ackle</metadata>
</glsa>
diff --git a/glsa-201409-01.xml b/glsa-201409-01.xml
index 2f07318b..7bd0b113 100644
--- a/glsa-201409-01.xml
+++ b/glsa-201409-01.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 01, 2014</announced>
- <revised>September 01, 2014: 1</revised>
+ <announced>2014-09-01</announced>
+ <revised>2014-09-01: 1</revised>
<bug>519014</bug>
<access>remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5161">CVE-2014-5161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5162">CVE-2014-5162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5163">CVE-2014-5163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5164">CVE-2014-5164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5165">CVE-2014-5165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5161">CVE-2014-5161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5162">CVE-2014-5162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5163">CVE-2014-5163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5164">CVE-2014-5164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5165">CVE-2014-5165</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Aug 2014 20:18:05 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 Sep 2014 15:52:10 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-08-25T20:18:05Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-01T15:52:10Z">K_F</metadata>
</glsa>
diff --git a/glsa-201409-02.xml b/glsa-201409-02.xml
index 39880224..45799837 100644
--- a/glsa-201409-02.xml
+++ b/glsa-201409-02.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>September 01, 2014</announced>
- <revised>September 01, 2014: 1</revised>
+ <announced>2014-09-01</announced>
+ <revised>2014-09-01: 1</revised>
<bug>431752</bug>
<bug>493296</bug>
<bug>502968</bug>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2141">CVE-2012-2141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6151">CVE-2012-6151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2284">CVE-2014-2284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2285">CVE-2014-2285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2141">CVE-2012-2141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6151">CVE-2012-6151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2284">CVE-2014-2284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2285">CVE-2014-2285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Dec 2012 17:40:35 +0000">
+ <metadata tag="requester" timestamp="2012-12-11T17:40:35Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 Sep 2014 21:23:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-09-01T21:23:11Z">ackle</metadata>
</glsa>
diff --git a/glsa-201409-03.xml b/glsa-201409-03.xml
index 930b2941..7c73b53b 100644
--- a/glsa-201409-03.xml
+++ b/glsa-201409-03.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>September 03, 2014</announced>
- <revised>September 03, 2014: 1</revised>
+ <announced>2014-09-03</announced>
+ <revised>2014-09-03: 1</revised>
<bug>518596</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6060">CVE-2014-6060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6060">CVE-2014-6060</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Aug 2014 20:16:47 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 03 Sep 2014 15:31:47 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-08-01T20:16:47Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-09-03T15:31:47Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201409-04.xml b/glsa-201409-04.xml
index 9c23049b..0c47a5bd 100644
--- a/glsa-201409-04.xml
+++ b/glsa-201409-04.xml
@@ -6,8 +6,8 @@
allows local attackers to escalate their privileges.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>September 04, 2014</announced>
- <revised>September 04, 2014: 1</revised>
+ <announced>2014-09-04</announced>
+ <revised>2014-09-04: 1</revised>
<bug>460748</bug>
<bug>488212</bug>
<bug>498164</bug>
@@ -50,47 +50,47 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1861">CVE-2013-1861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2134">CVE-2013-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3839">CVE-2013-3839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5767">CVE-2013-5767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5770">CVE-2013-5770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5786">CVE-2013-5786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5793">CVE-2013-5793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5807">CVE-2013-5807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5860">CVE-2013-5860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5881">CVE-2013-5881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5882">CVE-2013-5882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5891">CVE-2013-5891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5894">CVE-2013-5894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5908">CVE-2013-5908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0001">CVE-2014-0001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0384">CVE-2014-0384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0386">CVE-2014-0386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0393">CVE-2014-0393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0401">CVE-2014-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0402">CVE-2014-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0412">CVE-2014-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0420">CVE-2014-0420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0427">CVE-2014-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0430">CVE-2014-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0431">CVE-2014-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0433">CVE-2014-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0437">CVE-2014-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2419">CVE-2014-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2430">CVE-2014-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2431">CVE-2014-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2432">CVE-2014-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2434">CVE-2014-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2435">CVE-2014-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2436">CVE-2014-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2438">CVE-2014-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2440">CVE-2014-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1861">CVE-2013-1861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2134">CVE-2013-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3839">CVE-2013-3839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5767">CVE-2013-5767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5770">CVE-2013-5770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5786">CVE-2013-5786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5793">CVE-2013-5793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5807">CVE-2013-5807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5860">CVE-2013-5860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5881">CVE-2013-5881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5882">CVE-2013-5882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5891">CVE-2013-5891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5894">CVE-2013-5894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5908">CVE-2013-5908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0001">CVE-2014-0001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0384">CVE-2014-0384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0386">CVE-2014-0386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0393">CVE-2014-0393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0401">CVE-2014-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0402">CVE-2014-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0412">CVE-2014-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0420">CVE-2014-0420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0427">CVE-2014-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0430">CVE-2014-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0431">CVE-2014-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0433">CVE-2014-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0437">CVE-2014-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2419">CVE-2014-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2430">CVE-2014-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2431">CVE-2014-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2432">CVE-2014-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2434">CVE-2014-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2435">CVE-2014-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2436">CVE-2014-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2438">CVE-2014-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2440">CVE-2014-2440</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Feb 2014 14:34:22 +0000">
+ <metadata tag="requester" timestamp="2014-02-27T14:34:22Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 Sep 2014 08:34:34 +0000">
+ <metadata tag="submitter" timestamp="2014-09-04T08:34:34Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201409-05.xml b/glsa-201409-05.xml
index fa9d2885..bf6e9012 100644
--- a/glsa-201409-05.xml
+++ b/glsa-201409-05.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>522448</bug>
<access>remote</access>
<affected>
@@ -45,19 +45,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0547">CVE-2014-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0548">CVE-2014-0548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0549">CVE-2014-0549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0550">CVE-2014-0550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0551">CVE-2014-0551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0552">CVE-2014-0552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0553">CVE-2014-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0554">CVE-2014-0554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0555">CVE-2014-0555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0556">CVE-2014-0556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0557">CVE-2014-0557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0559">CVE-2014-0559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0547">CVE-2014-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0548">CVE-2014-0548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0549">CVE-2014-0549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0550">CVE-2014-0550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0551">CVE-2014-0551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0552">CVE-2014-0552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0553">CVE-2014-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0554">CVE-2014-0554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0555">CVE-2014-0555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0556">CVE-2014-0556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0557">CVE-2014-0557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0559">CVE-2014-0559</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Sep 2014 21:41:02 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:29:47 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-10T21:41:02Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:29:47Z">K_F</metadata>
</glsa>
diff --git a/glsa-201409-06.xml b/glsa-201409-06.xml
index 3f19a72d..0219bc18 100644
--- a/glsa-201409-06.xml
+++ b/glsa-201409-06.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>522484</bug>
<access>remote</access>
<affected>
@@ -44,9 +44,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3178">CVE-2014-3178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3179">CVE-2014-3179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3178">CVE-2014-3178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3179">CVE-2014-3179</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Sep 2014 17:05:58 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:50:35 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-11T17:05:58Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:50:35Z">K_F</metadata>
</glsa>
diff --git a/glsa-201409-07.xml b/glsa-201409-07.xml
index dc71896b..d8750347 100644
--- a/glsa-201409-07.xml
+++ b/glsa-201409-07.xml
@@ -4,8 +4,8 @@
<title>c-icap: Denial of Service</title>
<synopsis>A vulnerability in c-icap could result in Denial of Service. </synopsis>
<product type="ebuild">c-icap,DoS</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>455324</bug>
<access>remote</access>
<affected>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7401">CVE-2013-7401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7402">CVE-2013-7402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7401">CVE-2013-7401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7402">CVE-2013-7402</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:33:11 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:33:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:54:16 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:54:16Z">K_F</metadata>
</glsa>
diff --git a/glsa-201409-08.xml b/glsa-201409-08.xml
index e582cc1f..2164c92f 100644
--- a/glsa-201409-08.xml
+++ b/glsa-201409-08.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>509834</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0191">CVE-2014-0191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0191">CVE-2014-0191</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 21:06:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-17T21:06:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:56:04 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:56:04Z">K_F</metadata>
</glsa>
diff --git a/glsa-201409-09.xml b/glsa-201409-09.xml
index 2cecc3c0..d8c558bb 100644
--- a/glsa-201409-09.xml
+++ b/glsa-201409-09.xml
@@ -6,8 +6,8 @@
allow attackers to inject code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>September 24, 2014</announced>
- <revised>October 04, 2014: 4</revised>
+ <announced>2014-09-24</announced>
+ <revised>2014-10-04: 4</revised>
<bug>523592</bug>
<access>local, remote</access>
<affected>
@@ -74,8 +74,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6271">CVE-2014-6271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6271">CVE-2014-6271</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Sep 2014 16:00:19 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:25:14 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2014-09-24T16:00:19Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-10-04T22:25:14Z">a3li</metadata>
</glsa>
diff --git a/glsa-201409-10.xml b/glsa-201409-10.xml
index bfe734fe..eb699e75 100644
--- a/glsa-201409-10.xml
+++ b/glsa-201409-10.xml
@@ -7,8 +7,8 @@
201409-09 had an incomplete fix.
</synopsis>
<product type="ebuild">bash</product>
- <announced>September 25, 2014</announced>
- <revised>October 04, 2014: 2</revised>
+ <announced>2014-09-25</announced>
+ <revised>2014-10-04: 2</revised>
<bug>523592</bug>
<access>local, remote</access>
<affected>
@@ -80,12 +80,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7169">CVE-2014-7169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7169">CVE-2014-7169</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Sep 2014 12:49:54 +0000">
+ <metadata tag="requester" timestamp="2014-09-25T12:49:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:27:37 +0000">
+ <metadata tag="submitter" timestamp="2014-10-04T22:27:37Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201410-01.xml b/glsa-201410-01.xml
index 41875ec4..b94a3925 100644
--- a/glsa-201410-01.xml
+++ b/glsa-201410-01.xml
@@ -6,8 +6,8 @@
inject code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">bash</product>
- <announced>October 04, 2014</announced>
- <revised>October 04, 2014: 1</revised>
+ <announced>2014-10-04</announced>
+ <revised>2014-10-04: 1</revised>
<bug>523742</bug>
<bug>524256</bug>
<access>local, remote</access>
@@ -80,15 +80,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6277">CVE-2014-6277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6278">CVE-2014-6278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7186">CVE-2014-7186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7187">CVE-2014-7187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6277">CVE-2014-6277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6278">CVE-2014-6278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7186">CVE-2014-7186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7187">CVE-2014-7187</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Oct 2014 17:29:28 +0000">
+ <metadata tag="requester" timestamp="2014-10-04T17:29:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:13:43 +0000">
+ <metadata tag="submitter" timestamp="2014-10-04T22:13:43Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201410-02.xml b/glsa-201410-02.xml
index a0aaef41..9234024e 100644
--- a/glsa-201410-02.xml
+++ b/glsa-201410-02.xml
@@ -7,8 +7,8 @@
arbitrary Perl code.
</synopsis>
<product type="ebuild">Locale-Maketext</product>
- <announced>October 12, 2014</announced>
- <revised>December 29, 2014: 2</revised>
+ <announced>2014-10-12</announced>
+ <revised>2014-12-29: 2</revised>
<bug>446376</bug>
<access>remote</access>
<affected>
@@ -55,10 +55,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6329">CVE-2012-6329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6329">CVE-2012-6329</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2013 20:38:14 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Dec 2014 20:02:06 +0000">
+ <metadata tag="requester" timestamp="2013-01-01T20:38:14Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-29T20:02:06Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201411-01.xml b/glsa-201411-01.xml
index 81a57154..a4375648 100644
--- a/glsa-201411-01.xml
+++ b/glsa-201411-01.xml
@@ -6,8 +6,8 @@
could lead to user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">VLC</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>279340</bug>
<bug>285370</bug>
<bug>316709</bug>
@@ -66,42 +66,42 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1441">CVE-2010-1441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1442">CVE-2010-1442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1443">CVE-2010-1443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1444">CVE-2010-1444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1445">CVE-2010-1445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2937">CVE-2010-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3124">CVE-2010-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3275">CVE-2010-3275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3276">CVE-2010-3276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3907">CVE-2010-3907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0021">CVE-2011-0021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0522">CVE-2011-0522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0531">CVE-2011-0531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1087">CVE-2011-1087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1684">CVE-2011-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2194">CVE-2011-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2587">CVE-2011-2587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2588">CVE-2011-2588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3623">CVE-2011-3623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0023">CVE-2012-0023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1775">CVE-2012-1775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1776">CVE-2012-1776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2396">CVE-2012-2396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3377">CVE-2012-3377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5470">CVE-2012-5470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5855">CVE-2012-5855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1868">CVE-2013-1868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1954">CVE-2013-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3245">CVE-2013-3245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4388">CVE-2013-4388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6283">CVE-2013-6283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6934">CVE-2013-6934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1441">CVE-2010-1441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1442">CVE-2010-1442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1443">CVE-2010-1443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1444">CVE-2010-1444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1445">CVE-2010-1445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2937">CVE-2010-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3124">CVE-2010-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3275">CVE-2010-3275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3276">CVE-2010-3276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3907">CVE-2010-3907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0021">CVE-2011-0021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0522">CVE-2011-0522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0531">CVE-2011-0531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1087">CVE-2011-1087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1684">CVE-2011-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2194">CVE-2011-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2587">CVE-2011-2587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2588">CVE-2011-2588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3623">CVE-2011-3623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0023">CVE-2012-0023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1775">CVE-2012-1775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1776">CVE-2012-1776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2396">CVE-2012-2396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3377">CVE-2012-3377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5470">CVE-2012-5470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5855">CVE-2012-5855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1868">CVE-2013-1868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1954">CVE-2013-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3245">CVE-2013-3245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4388">CVE-2013-4388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6283">CVE-2013-6283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6934">CVE-2013-6934</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:33 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 21:31:51 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:33Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T21:31:51Z">
underling
</metadata>
</glsa>
diff --git a/glsa-201411-02.xml b/glsa-201411-02.xml
index 3d3816d1..655777e7 100644
--- a/glsa-201411-02.xml
+++ b/glsa-201411-02.xml
@@ -6,8 +6,8 @@
possibly allowing attackers to cause unspecified impact.
</synopsis>
<product type="ebuild">mysql mariadb</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>525504</bug>
<access>remote</access>
<affected>
@@ -56,16 +56,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6464">CVE-2014-6464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6469">CVE-2014-6469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6491">CVE-2014-6491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6494">CVE-2014-6494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6496">CVE-2014-6496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6500">CVE-2014-6500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6507">CVE-2014-6507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6555">CVE-2014-6555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6559">CVE-2014-6559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6464">CVE-2014-6464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6469">CVE-2014-6469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6491">CVE-2014-6491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6494">CVE-2014-6494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6496">CVE-2014-6496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6500">CVE-2014-6500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6507">CVE-2014-6507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6555">CVE-2014-6555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6559">CVE-2014-6559</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Oct 2014 22:45:02 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 23:49:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-10-22T22:45:02Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T23:49:01Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-03.xml b/glsa-201411-03.xml
index 75ea3e56..345ce464 100644
--- a/glsa-201411-03.xml
+++ b/glsa-201411-03.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tigervnc</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>505170</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0011">CVE-2014-0011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0011">CVE-2014-0011</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Sep 2014 21:44:21 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 23:50:26 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-09-26T21:44:21Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T23:50:26Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-04.xml b/glsa-201411-04.xml
index 5150a706..41511126 100644
--- a/glsa-201411-04.xml
+++ b/glsa-201411-04.xml
@@ -6,8 +6,8 @@
which could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 09, 2014</announced>
- <revised>August 22, 2015: 3</revised>
+ <announced>2014-11-09</announced>
+ <revised>2015-08-22: 3</revised>
<bug>525960</bug>
<access>remote</access>
<affected>
@@ -76,10 +76,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3668">CVE-2014-3668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3669">CVE-2014-3669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3670">CVE-2014-3670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3668">CVE-2014-3668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3669">CVE-2014-3669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3670">CVE-2014-3670</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 03 Nov 2014 23:38:25 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:31:28 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-03T23:38:25Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-08-22T22:31:28Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-05.xml b/glsa-201411-05.xml
index d10aff16..4d4ad3c2 100644
--- a/glsa-201411-05.xml
+++ b/glsa-201411-05.xml
@@ -6,8 +6,8 @@
code execution.
</synopsis>
<product type="ebuild">wget</product>
- <announced>November 16, 2014</announced>
- <revised>November 16, 2014: 1</revised>
+ <announced>2014-11-16</announced>
+ <revised>2014-11-16: 1</revised>
<bug>527056</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4877">CVE-2014-4877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4877">CVE-2014-4877</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Nov 2014 09:21:36 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 16 Nov 2014 08:06:22 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-11-09T09:21:36Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-11-16T08:06:22Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201411-06.xml b/glsa-201411-06.xml
index 8442421e..304bc9b0 100644
--- a/glsa-201411-06.xml
+++ b/glsa-201411-06.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 21, 2014</announced>
- <revised>November 21, 2014: 2</revised>
+ <announced>2014-11-21</announced>
+ <revised>2014-11-21: 2</revised>
<bug>525430</bug>
<bug>529088</bug>
<access>remote</access>
@@ -46,28 +46,28 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558">CVE-2014-0558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564">CVE-2014-0564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569">CVE-2014-0569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573">CVE-2014-0573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574">CVE-2014-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576">CVE-2014-0576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577">CVE-2014-0577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581">CVE-2014-0581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582">CVE-2014-0582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583">CVE-2014-0583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584">CVE-2014-0584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585">CVE-2014-0585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586">CVE-2014-0586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588">CVE-2014-0588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589">CVE-2014-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590">CVE-2014-0590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437">CVE-2014-8437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438">CVE-2014-8438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440">CVE-2014-8440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441">CVE-2014-8441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442">CVE-2014-8442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558">CVE-2014-0558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564">CVE-2014-0564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569">CVE-2014-0569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573">CVE-2014-0573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574">CVE-2014-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576">CVE-2014-0576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577">CVE-2014-0577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581">CVE-2014-0581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582">CVE-2014-0582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583">CVE-2014-0583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584">CVE-2014-0584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585">CVE-2014-0585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586">CVE-2014-0586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588">CVE-2014-0588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589">CVE-2014-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590">CVE-2014-0590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437">CVE-2014-8437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438">CVE-2014-8438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440">CVE-2014-8440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441">CVE-2014-8441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442">CVE-2014-8442</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Nov 2014 14:56:06 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Nov 2014 12:07:58 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-11-16T14:56:06Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-11-21T12:07:58Z">K_F</metadata>
</glsa>
diff --git a/glsa-201411-07.xml b/glsa-201411-07.xml
index 40cbec8c..2c982974 100644
--- a/glsa-201411-07.xml
+++ b/glsa-201411-07.xml
@@ -6,8 +6,8 @@
to cause Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>499870</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466">CVE-2013-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466">CVE-2013-6466</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:21:40 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:21:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:45:46 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:45:46Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-08.xml b/glsa-201411-08.xml
index 7ae5a57b..97c1b780 100644
--- a/glsa-201411-08.xml
+++ b/glsa-201411-08.xml
@@ -7,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>528132</bug>
<access>local, remote</access>
<affected>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8321">CVE-2014-8321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8322">CVE-2014-8322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8323">CVE-2014-8323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8324">CVE-2014-8324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8321">CVE-2014-8321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8322">CVE-2014-8322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8323">CVE-2014-8323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8324">CVE-2014-8324</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 22:39:08 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:49:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T22:39:08Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:49:06Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-09.xml b/glsa-201411-09.xml
index c0f09a48..10d05c35 100644
--- a/glsa-201411-09.xml
+++ b/glsa-201411-09.xml
@@ -6,8 +6,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">ansible</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>516564</bug>
<bug>517770</bug>
<access>local</access>
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4657">CVE-2014-4657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4678">CVE-2014-4678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4966">CVE-2014-4966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4967">CVE-2014-4967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4657">CVE-2014-4657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4678">CVE-2014-4678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4966">CVE-2014-4966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4967">CVE-2014-4967</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Jul 2014 06:05:38 +0000">
+ <metadata tag="requester" timestamp="2014-07-31T06:05:38Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:50:42 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:50:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-10.xml b/glsa-201411-10.xml
index cb9b2b1f..a8032537 100644
--- a/glsa-201411-10.xml
+++ b/glsa-201411-10.xml
@@ -6,8 +6,8 @@
which could lead to Denial of Service.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>523216</bug>
<bug>526208</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6610">CVE-2014-6610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6610">CVE-2014-6610</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2014 19:18:45 +0000">
+ <metadata tag="requester" timestamp="2014-09-22T19:18:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:54:08 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:54:08Z">ackle</metadata>
</glsa>
diff --git a/glsa-201411-11.xml b/glsa-201411-11.xml
index 5cf8bd32..6f4b9087 100644
--- a/glsa-201411-11.xml
+++ b/glsa-201411-11.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">squid</product>
- <announced>November 27, 2014</announced>
- <revised>November 27, 2014: 1</revised>
+ <announced>2014-11-27</announced>
+ <revised>2014-11-27: 1</revised>
<bug>504176</bug>
<bug>522498</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0128">CVE-2014-0128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7141">CVE-2014-7141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7142">CVE-2014-7142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0128">CVE-2014-0128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7141">CVE-2014-7141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7142">CVE-2014-7142</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:12:15 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:12:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2014 14:39:02 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-11-27T14:39:02Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-01.xml b/glsa-201412-01.xml
index 88221fb1..bb0d7f66 100644
--- a/glsa-201412-01.xml
+++ b/glsa-201412-01.xml
@@ -6,8 +6,8 @@
which allows context dependent attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>514680</bug>
<bug>519506</bug>
<bug>520688</bug>
@@ -47,15 +47,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3471">CVE-2014-3471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3615">CVE-2014-3615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3640">CVE-2014-3640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5263">CVE-2014-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5388">CVE-2014-5388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7815">CVE-2014-7815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3471">CVE-2014-3471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3615">CVE-2014-3615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3640">CVE-2014-3640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5263">CVE-2014-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5388">CVE-2014-5388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7815">CVE-2014-7815</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Oct 2014 01:51:26 +0000">
+ <metadata tag="requester" timestamp="2014-10-05T01:51:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:33:07 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:33:07Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-02.xml b/glsa-201412-02.xml
index 3aabc630..74ba30b8 100644
--- a/glsa-201412-02.xml
+++ b/glsa-201412-02.xml
@@ -6,8 +6,8 @@
access to restricted information.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>464636</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1923">CVE-2013-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1923">CVE-2013-1923</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 27 Jun 2014 21:18:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-27T21:18:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:50:14 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:50:14Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-03.xml b/glsa-201412-03.xml
index 14ce3a70..72c37fba 100644
--- a/glsa-201412-03.xml
+++ b/glsa-201412-03.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>509954</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3430">CVE-2014-3430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3430">CVE-2014-3430</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 18:57:07 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T18:57:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:57:38 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:57:38Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-04.xml b/glsa-201412-04.xml
index 93d1f222..36094bee 100644
--- a/glsa-201412-04.xml
+++ b/glsa-201412-04.xml
@@ -6,8 +6,8 @@
allows context-dependent attackers to escalate privileges.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>483048</bug>
<bug>484014</bug>
<bug>485520</bug>
@@ -55,29 +55,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4292">CVE-2013-4292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4296">CVE-2013-4296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4297">CVE-2013-4297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4399">CVE-2013-4399</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4400">CVE-2013-4400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4401">CVE-2013-4401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5651">CVE-2013-5651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6436">CVE-2013-6436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6456">CVE-2013-6456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6457">CVE-2013-6457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6458">CVE-2013-6458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7336">CVE-2013-7336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0028">CVE-2014-0028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0179">CVE-2014-0179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1447">CVE-2014-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3633">CVE-2014-3633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5177">CVE-2014-5177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7823">CVE-2014-7823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4292">CVE-2013-4292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4296">CVE-2013-4296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4297">CVE-2013-4297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4399">CVE-2013-4399</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4400">CVE-2013-4400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4401">CVE-2013-4401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5651">CVE-2013-5651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6436">CVE-2013-6436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6456">CVE-2013-6456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6457">CVE-2013-6457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6458">CVE-2013-6458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7336">CVE-2013-7336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0028">CVE-2014-0028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0179">CVE-2014-0179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1447">CVE-2014-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3633">CVE-2014-3633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5177">CVE-2014-5177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7823">CVE-2014-7823</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Oct 2013 09:12:28 +0000">
+ <metadata tag="requester" timestamp="2013-10-02T09:12:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 23:26:05 +0000">
+ <metadata tag="submitter" timestamp="2014-12-08T23:26:05Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201412-05.xml b/glsa-201412-05.xml
index 34a06f6c..8bd382a7 100644
--- a/glsa-201412-05.xml
+++ b/glsa-201412-05.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 09, 2014</announced>
- <revised>December 09, 2014: 2</revised>
+ <announced>2014-12-09</announced>
+ <revised>2014-12-09: 2</revised>
<bug>529728</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050">CVE-2014-9050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050">CVE-2014-9050</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2014 19:55:16 +0000">
+ <metadata tag="requester" timestamp="2014-12-07T19:55:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Dec 2014 12:58:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-09T12:58:59Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-06.xml b/glsa-201412-06.xml
index 59837020..32cfc034 100644
--- a/glsa-201412-06.xml
+++ b/glsa-201412-06.xml
@@ -4,8 +4,8 @@
<title>libxml2: Denial of Service</title>
<synopsis>A vulnerability in libxml2 could result in Denial of Service.</synopsis>
<product type="ebuild">libxml2</product>
- <announced>December 10, 2014</announced>
- <revised>December 10, 2014: 1</revised>
+ <announced>2014-12-10</announced>
+ <revised>2014-12-10: 1</revised>
<bug>525656</bug>
<access>local, remote</access>
<affected>
@@ -44,8 +44,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660">CVE-2014-3660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660">CVE-2014-3660</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2014 18:18:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Dec 2014 08:06:04 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-09T18:18:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-10T08:06:04Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-07.xml b/glsa-201412-07.xml
index 112fac5c..90343709 100644
--- a/glsa-201412-07.xml
+++ b/glsa-201412-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE</product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>530692</bug>
<bug>532074</bug>
<access>remote</access>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0580">CVE-2014-0580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0587">CVE-2014-0587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8439">CVE-2014-8439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8443">CVE-2014-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9162">CVE-2014-9162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9163">CVE-2014-9163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9164">CVE-2014-9164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0580">CVE-2014-0580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0587">CVE-2014-0587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8439">CVE-2014-8439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8443">CVE-2014-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9162">CVE-2014-9162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9163">CVE-2014-9163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9164">CVE-2014-9164</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2014 20:43:22 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 06:58:45 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-09T20:43:22Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T06:58:45Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-08.xml b/glsa-201412-08.xml
index 172c499b..c027c352 100644
--- a/glsa-201412-08.xml
+++ b/glsa-201412-08.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>159556</bug>
<bug>208464</bug>
<bug>253822</bug>
@@ -391,38 +391,38 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3005">CVE-2006-3005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0553">CVE-2008-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5907">CVE-2008-5907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6218">CVE-2008-6218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6661">CVE-2008-6661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040">CVE-2009-0040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0360">CVE-2009-0360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0361">CVE-2009-0361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0946">CVE-2009-0946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2042">CVE-2009-2042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2624">CVE-2009-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4411">CVE-2009-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4896">CVE-2009-4896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0001">CVE-2010-0001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0436">CVE-2010-0436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0732">CVE-2010-0732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0829">CVE-2010-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1000">CVE-2010-1000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1511">CVE-2010-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2056">CVE-2010-2056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2060">CVE-2010-2060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192">CVE-2010-2192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2251">CVE-2010-2251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2529">CVE-2010-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809">CVE-2010-2809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2945">CVE-2010-2945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3005">CVE-2006-3005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0553">CVE-2008-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5907">CVE-2008-5907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6218">CVE-2008-6218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6661">CVE-2008-6661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040">CVE-2009-0040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0360">CVE-2009-0360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0361">CVE-2009-0361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0946">CVE-2009-0946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2042">CVE-2009-2042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2624">CVE-2009-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4411">CVE-2009-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4896">CVE-2009-4896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0001">CVE-2010-0001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0436">CVE-2010-0436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0732">CVE-2010-0732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0829">CVE-2010-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1000">CVE-2010-1000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1511">CVE-2010-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2056">CVE-2010-2056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2060">CVE-2010-2060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192">CVE-2010-2192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2251">CVE-2010-2251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2529">CVE-2010-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809">CVE-2010-2809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2945">CVE-2010-2945</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 10:53:22 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:30:24 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-06-16T10:53:22Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:30:24Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-09.xml b/glsa-201412-09.xml
index eefa163a..ccbe05f2 100644
--- a/glsa-201412-09.xml
+++ b/glsa-201412-09.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 2</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 2</revised>
<bug>194151</bug>
<bug>294253</bug>
<bug>294256</bug>
@@ -372,68 +372,68 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370">CVE-2007-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023">CVE-2009-4023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111">CVE-2009-4111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778">CVE-2010-0778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780">CVE-2010-1780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782">CVE-2010-1782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783">CVE-2010-1783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784">CVE-2010-1784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785">CVE-2010-1785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786">CVE-2010-1786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787">CVE-2010-1787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788">CVE-2010-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790">CVE-2010-1790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791">CVE-2010-1791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792">CVE-2010-1792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793">CVE-2010-1793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807">CVE-2010-1807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812">CVE-2010-1812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814">CVE-2010-1814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815">CVE-2010-1815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526">CVE-2010-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901">CVE-2010-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255">CVE-2010-3255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257">CVE-2010-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259">CVE-2010-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362">CVE-2010-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374">CVE-2010-3374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812">CVE-2010-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813">CVE-2010-3813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999">CVE-2010-3999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042">CVE-2010-4042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197">CVE-2010-4197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198">CVE-2010-4198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204">CVE-2010-4204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206">CVE-2010-4206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492">CVE-2010-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493">CVE-2010-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577">CVE-2010-4577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578">CVE-2010-4578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007">CVE-2011-0007</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465">CVE-2011-0465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482">CVE-2011-0482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721">CVE-2011-0721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727">CVE-2011-0727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904">CVE-2011-0904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905">CVE-2011-0905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072">CVE-2011-1072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097">CVE-2011-1097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144">CVE-2011-1144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425">CVE-2011-1425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572">CVE-2011-1572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760">CVE-2011-1760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951">CVE-2011-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471">CVE-2011-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472">CVE-2011-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473">CVE-2011-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524">CVE-2011-2524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366">CVE-2011-3366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367">CVE-2011-3367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370">CVE-2007-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023">CVE-2009-4023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111">CVE-2009-4111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778">CVE-2010-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780">CVE-2010-1780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782">CVE-2010-1782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783">CVE-2010-1783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784">CVE-2010-1784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785">CVE-2010-1785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786">CVE-2010-1786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787">CVE-2010-1787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788">CVE-2010-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790">CVE-2010-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791">CVE-2010-1791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792">CVE-2010-1792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793">CVE-2010-1793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807">CVE-2010-1807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812">CVE-2010-1812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814">CVE-2010-1814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815">CVE-2010-1815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526">CVE-2010-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901">CVE-2010-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255">CVE-2010-3255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257">CVE-2010-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259">CVE-2010-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362">CVE-2010-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374">CVE-2010-3374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812">CVE-2010-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813">CVE-2010-3813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999">CVE-2010-3999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042">CVE-2010-4042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197">CVE-2010-4197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198">CVE-2010-4198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204">CVE-2010-4204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206">CVE-2010-4206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492">CVE-2010-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493">CVE-2010-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577">CVE-2010-4577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578">CVE-2010-4578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007">CVE-2011-0007</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465">CVE-2011-0465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482">CVE-2011-0482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721">CVE-2011-0721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727">CVE-2011-0727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904">CVE-2011-0904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905">CVE-2011-0905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072">CVE-2011-1072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097">CVE-2011-1097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144">CVE-2011-1144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425">CVE-2011-1425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572">CVE-2011-1572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760">CVE-2011-1760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951">CVE-2011-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471">CVE-2011-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472">CVE-2011-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473">CVE-2011-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524">CVE-2011-2524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366">CVE-2011-3366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367">CVE-2011-3367</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:29 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:55:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:29Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:55:16Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-10.xml b/glsa-201412-10.xml
index 77e07db4..cd3edcda 100644
--- a/glsa-201412-10.xml
+++ b/glsa-201412-10.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>284536</bug>
<bug>300903</bug>
<bug>334475</bug>
@@ -149,18 +149,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4776">CVE-2008-4776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2713">CVE-2010-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3313">CVE-2010-3313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3314">CVE-2010-3314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0765">CVE-2011-0765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2198">CVE-2011-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0807">CVE-2012-0807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0808">CVE-2012-0808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1620">CVE-2012-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2738">CVE-2012-2738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3448">CVE-2012-3448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4776">CVE-2008-4776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2713">CVE-2010-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3313">CVE-2010-3313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3314">CVE-2010-3314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0765">CVE-2011-0765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2198">CVE-2011-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0807">CVE-2012-0807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0808">CVE-2012-0808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1620">CVE-2012-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2738">CVE-2012-2738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3448">CVE-2012-3448</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:30:44 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:30:44Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-11.xml b/glsa-201412-11.xml
index 81e484fe..10a8b1b9 100644
--- a/glsa-201412-11.xml
+++ b/glsa-201412-11.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>December 12, 2014</announced>
- <revised>December 12, 2014: 1</revised>
+ <announced>2014-12-12</announced>
+ <revised>2014-12-12: 1</revised>
<bug>196865</bug>
<bug>335508</bug>
<bug>483632</bug>
@@ -57,29 +57,29 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720">CVE-2007-0720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536">CVE-2007-1536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026">CVE-2007-2026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445">CVE-2007-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108">CVE-2007-3108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995">CVE-2007-4995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116">CVE-2007-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135">CVE-2007-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266">CVE-2007-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268">CVE-2007-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849">CVE-2007-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339">CVE-2013-0339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720">CVE-2007-0720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026">CVE-2007-2026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445">CVE-2007-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108">CVE-2007-3108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995">CVE-2007-4995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116">CVE-2007-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135">CVE-2007-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266">CVE-2007-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268">CVE-2007-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849">CVE-2007-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339">CVE-2013-0339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:06 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Dec 2014 00:46:06 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-12T00:46:06Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-12.xml b/glsa-201412-12.xml
index 59fb651f..e7a4bf08 100644
--- a/glsa-201412-12.xml
+++ b/glsa-201412-12.xml
@@ -6,8 +6,8 @@
resulting in local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>512940</bug>
<bug>516080</bug>
<bug>522982</bug>
@@ -45,18 +45,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3477">CVE-2014-3477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3532">CVE-2014-3532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3533">CVE-2014-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3635">CVE-2014-3635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3636">CVE-2014-3636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3637">CVE-2014-3637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3638">CVE-2014-3638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3639">CVE-2014-3639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7824">CVE-2014-7824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3477">CVE-2014-3477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3532">CVE-2014-3532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3533">CVE-2014-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3635">CVE-2014-3635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3636">CVE-2014-3636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3637">CVE-2014-3637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3638">CVE-2014-3638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3639">CVE-2014-3639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7824">CVE-2014-7824</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 15:00:32 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T15:00:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 14:54:26 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T14:54:26Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-13.xml b/glsa-201412-13.xml
index 40cc91c0..4f61da3c 100644
--- a/glsa-201412-13.xml
+++ b/glsa-201412-13.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>524764</bug>
<bug>529858</bug>
<access>remote</access>
@@ -43,32 +43,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3188">CVE-2014-3188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3189">CVE-2014-3189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3190">CVE-2014-3190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3191">CVE-2014-3191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3192">CVE-2014-3192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3193">CVE-2014-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3194">CVE-2014-3194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3195">CVE-2014-3195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3197">CVE-2014-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3198">CVE-2014-3198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3199">CVE-2014-3199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3200">CVE-2014-3200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7899">CVE-2014-7899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7900">CVE-2014-7900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7901">CVE-2014-7901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7902">CVE-2014-7902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7903">CVE-2014-7903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7904">CVE-2014-7904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7906">CVE-2014-7906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7907">CVE-2014-7907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7908">CVE-2014-7908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7909">CVE-2014-7909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7910">CVE-2014-7910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3188">CVE-2014-3188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3189">CVE-2014-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3190">CVE-2014-3190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3191">CVE-2014-3191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3192">CVE-2014-3192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3193">CVE-2014-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3194">CVE-2014-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3195">CVE-2014-3195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3197">CVE-2014-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3198">CVE-2014-3198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3199">CVE-2014-3199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3200">CVE-2014-3200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7899">CVE-2014-7899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7900">CVE-2014-7900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7901">CVE-2014-7901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7902">CVE-2014-7902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7903">CVE-2014-7903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7904">CVE-2014-7904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7906">CVE-2014-7906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7907">CVE-2014-7907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7908">CVE-2014-7908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7909">CVE-2014-7909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7910">CVE-2014-7910</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Oct 2014 04:33:14 +0000">
+ <metadata tag="requester" timestamp="2014-10-15T04:33:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 16:36:21 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T16:36:21Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-14.xml b/glsa-201412-14.xml
index c8e74a08..059610b6 100644
--- a/glsa-201412-14.xml
+++ b/glsa-201412-14.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">xfig</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>297379</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4227">CVE-2009-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4228">CVE-2009-4228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4227">CVE-2009-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4228">CVE-2009-4228</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 22:27:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T22:27:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:33Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-15.xml b/glsa-201412-15.xml
index 5dafa99c..ee8e27cc 100644
--- a/glsa-201412-15.xml
+++ b/glsa-201412-15.xml
@@ -6,8 +6,8 @@
which could lead to privilege escalation.
</synopsis>
<product type="ebuild">mcollective</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>513292</bug>
<bug>517286</bug>
<access>local</access>
@@ -53,9 +53,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3251">CVE-2014-3251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3251">CVE-2014-3251</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Jul 2014 21:26:18 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-07-22T21:26:18Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:37Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-16.xml b/glsa-201412-16.xml
index 8279d5f7..6d8cf5f5 100644
--- a/glsa-201412-16.xml
+++ b/glsa-201412-16.xml
@@ -4,8 +4,8 @@
<title>CouchDB: Denial of Service</title>
<synopsis>A vulnerability in CouchDB could result in Denial of Service.</synopsis>
<product type="ebuild">couchdb</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>506354</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2668">CVE-2014-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2668">CVE-2014-2668</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:24:09 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:24:09Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:39 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:39Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-17.xml b/glsa-201412-17.xml
index 349b03ab..62038205 100644
--- a/glsa-201412-17.xml
+++ b/glsa-201412-17.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>264594</bug>
<bug>300192</bug>
<bug>332061</bug>
@@ -47,16 +47,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0196">CVE-2009-0196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0792">CVE-2009-0792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743">CVE-2009-3743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270">CVE-2009-4270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897">CVE-2009-4897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1628">CVE-2010-1628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2055">CVE-2010-2055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054">CVE-2010-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0196">CVE-2009-0196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0792">CVE-2009-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743">CVE-2009-3743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270">CVE-2009-4270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897">CVE-2009-4897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1628">CVE-2010-1628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2055">CVE-2010-2055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054">CVE-2010-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:17 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:38:17Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-18.xml b/glsa-201412-18.xml
index 92ddc66c..797421cd 100644
--- a/glsa-201412-18.xml
+++ b/glsa-201412-18.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">freerdp</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>511688</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0250">CVE-2014-0250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0250">CVE-2014-0250</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jul 2014 13:32:41 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-07-05T13:32:41Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:45Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-19.xml b/glsa-201412-19.xml
index 128b951d..2c7f6546 100644
--- a/glsa-201412-19.xml
+++ b/glsa-201412-19.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">ppp</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 2</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 2</revised>
<bug>519650</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3158">CVE-2014-3158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3158">CVE-2014-3158</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Aug 2014 10:14:30 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:01:42 +0000">
+ <metadata tag="requester" timestamp="2014-08-21T10:14:30Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:01:42Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201412-20.xml b/glsa-201412-20.xml
index f4d4eb51..2e4b6c26 100644
--- a/glsa-201412-20.xml
+++ b/glsa-201412-20.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">gnustep-base</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>508370</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2980">CVE-2014-2980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2980">CVE-2014-2980</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:07:11 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:07:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:03:50 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:03:50Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-21.xml b/glsa-201412-21.xml
index e5610e90..5a686582 100644
--- a/glsa-201412-21.xml
+++ b/glsa-201412-21.xml
@@ -6,8 +6,8 @@
could result in local privilege escalation.
</synopsis>
<product type="ebuild">mod_wsgi</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>510938</bug>
<access>local, remote</access>
<affected>
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0240">CVE-2014-0240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0242">CVE-2014-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0240">CVE-2014-0240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0242">CVE-2014-0242</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2014 02:20:25 +0000">
+ <metadata tag="requester" timestamp="2014-06-14T02:20:25Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:03:56 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:03:56Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-22.xml b/glsa-201412-22.xml
index bc4797f5..96232da7 100644
--- a/glsa-201412-22.xml
+++ b/glsa-201412-22.xml
@@ -6,8 +6,8 @@
which may lead to Denial of Service.
</synopsis>
<product type="ebuild">django</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>521324</bug>
<access>remote</access>
<affected>
@@ -57,11 +57,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0480">CVE-2014-0480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0481">CVE-2014-0481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0482">CVE-2014-0482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0483">CVE-2014-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0480">CVE-2014-0480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0481">CVE-2014-0481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0482">CVE-2014-0482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0483">CVE-2014-0483</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Sep 2014 18:15:07 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:08:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-09-04T18:15:07Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:08:48Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-23.xml b/glsa-201412-23.xml
index 1ae96c7c..681a372f 100644
--- a/glsa-201412-23.xml
+++ b/glsa-201412-23.xml
@@ -6,8 +6,8 @@
which may allow remote code execution.
</synopsis>
<product type="ebuild">nagios-core</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>447802</bug>
<bug>495132</bug>
<bug>501200</bug>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6096">CVE-2012-6096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7108">CVE-2013-7108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7205">CVE-2013-7205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6096">CVE-2012-6096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7108">CVE-2013-7108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7205">CVE-2013-7205</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2014 20:13:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-07T20:13:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:06Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-24.xml b/glsa-201412-24.xml
index 4772a232..77fa771a 100644
--- a/glsa-201412-24.xml
+++ b/glsa-201412-24.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>484802</bug>
<bug>493662</bug>
<access>remote</access>
@@ -44,17 +44,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1447">CVE-2013-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4289">CVE-2013-4289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4290">CVE-2013-4290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6045">CVE-2013-6045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6052">CVE-2013-6052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6053">CVE-2013-6053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6054">CVE-2013-6054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6887">CVE-2013-6887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1447">CVE-2013-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4289">CVE-2013-4289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4290">CVE-2013-4290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6045">CVE-2013-6045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6052">CVE-2013-6052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6053">CVE-2013-6053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6054">CVE-2013-6054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6887">CVE-2013-6887</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Sep 2014 00:46:34 +0000">
+ <metadata tag="requester" timestamp="2014-09-20T00:46:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:13 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:13Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-25.xml b/glsa-201412-25.xml
index 3661daf6..36c534d9 100644
--- a/glsa-201412-25.xml
+++ b/glsa-201412-25.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">qtgui</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>508984</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0190">CVE-2014-0190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0190">CVE-2014-0190</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jun 2014 13:56:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-09T13:56:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:19 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:19Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-26.xml b/glsa-201412-26.xml
index 5d588a5c..7e4c451c 100644
--- a/glsa-201412-26.xml
+++ b/glsa-201412-26.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service or a bypass in authentication restrictions.
</synopsis>
<product type="ebuild">strongswan</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>507722</bug>
<bug>509832</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2338">CVE-2014-2338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2891">CVE-2014-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2338">CVE-2014-2338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2891">CVE-2014-2891</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:27:51 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:27:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:56:21 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:56:21Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-27.xml b/glsa-201412-27.xml
index b895503a..56adc334 100644
--- a/glsa-201412-27.xml
+++ b/glsa-201412-27.xml
@@ -6,8 +6,8 @@
context-dependent attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">Ruby</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>355439</bug>
<bug>369141</bug>
<bug>396301</bug>
@@ -59,20 +59,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188">CVE-2011-0188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004">CVE-2011-1004</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005">CVE-2011-1005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815">CVE-2011-4815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481">CVE-2012-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371">CVE-2012-5371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269">CVE-2013-0269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821">CVE-2013-1821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164">CVE-2013-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080">CVE-2014-8080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090">CVE-2014-8090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188">CVE-2011-0188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004">CVE-2011-1004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005">CVE-2011-1005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815">CVE-2011-4815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481">CVE-2012-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371">CVE-2012-5371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269">CVE-2013-0269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821">CVE-2013-1821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164">CVE-2013-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080">CVE-2014-8080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090">CVE-2014-8090</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:04 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:04Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:56:30 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:56:30Z">craig</metadata>
</glsa>
diff --git a/glsa-201412-28.xml b/glsa-201412-28.xml
index cd049c2a..bc7584ff 100644
--- a/glsa-201412-28.xml
+++ b/glsa-201412-28.xml
@@ -6,8 +6,8 @@
which allowing for execution of arbitrary code.
</synopsis>
<product type="ebuild">rails</product>
- <announced>December 14, 2014</announced>
- <revised>December 14, 2014: 1</revised>
+ <announced>2014-12-14</announced>
+ <revised>2014-12-14: 1</revised>
<bug>354249</bug>
<bug>379511</bug>
<bug>386377</bug>
@@ -62,28 +62,28 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933">CVE-2010-3933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446">CVE-2011-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447">CVE-2011-0447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448">CVE-2011-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449">CVE-2011-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929">CVE-2011-2929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930">CVE-2011-2930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931">CVE-2011-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932">CVE-2011-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186">CVE-2011-3186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155">CVE-2013-0155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156">CVE-2013-0156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276">CVE-2013-0276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277">CVE-2013-0277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333">CVE-2013-0333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854">CVE-2013-1854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855">CVE-2013-1855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856">CVE-2013-1856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857">CVE-2013-1857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933">CVE-2010-3933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446">CVE-2011-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447">CVE-2011-0447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448">CVE-2011-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449">CVE-2011-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929">CVE-2011-2929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930">CVE-2011-2930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931">CVE-2011-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932">CVE-2011-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186">CVE-2011-3186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155">CVE-2013-0155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156">CVE-2013-0156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276">CVE-2013-0276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277">CVE-2013-0277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333">CVE-2013-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854">CVE-2013-1854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855">CVE-2013-1855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856">CVE-2013-1856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857">CVE-2013-1857</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:28:02 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Dec 2014 20:13:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-08T22:28:02Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-14T20:13:16Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201412-29.xml b/glsa-201412-29.xml
index 9f3aa55b..d2b922f6 100644
--- a/glsa-201412-29.xml
+++ b/glsa-201412-29.xml
@@ -6,8 +6,8 @@
worst of which may result in Denial of Service.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>December 15, 2014</announced>
- <revised>March 20, 2016: 2</revised>
+ <announced>2014-12-15</announced>
+ <revised>2016-03-20: 2</revised>
<bug>442014</bug>
<bug>469434</bug>
<bug>500600</bug>
@@ -62,26 +62,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2733">CVE-2012-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3544">CVE-2012-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3546">CVE-2012-3546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4431">CVE-2012-4431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4534">CVE-2012-4534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5885">CVE-2012-5885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5886">CVE-2012-5886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5887">CVE-2012-5887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2067">CVE-2013-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2071">CVE-2013-2071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4286">CVE-2013-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4322">CVE-2013-4322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4590">CVE-2013-4590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0033">CVE-2014-0033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0050">CVE-2014-0050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0075">CVE-2014-0075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0096">CVE-2014-0096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0099">CVE-2014-0099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0119">CVE-2014-0119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2733">CVE-2012-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3544">CVE-2012-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3546">CVE-2012-3546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4431">CVE-2012-4431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4534">CVE-2012-4534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5885">CVE-2012-5885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5886">CVE-2012-5886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5887">CVE-2012-5887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2067">CVE-2013-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2071">CVE-2013-2071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4286">CVE-2013-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4322">CVE-2013-4322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4590">CVE-2013-4590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0033">CVE-2014-0033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0050">CVE-2014-0050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0075">CVE-2014-0075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0096">CVE-2014-0096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0099">CVE-2014-0099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0119">CVE-2014-0119</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 22:03:30 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 14:13:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T22:03:30Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-03-20T14:13:30Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-30.xml b/glsa-201412-30.xml
index 74d68698..25c7a2ba 100644
--- a/glsa-201412-30.xml
+++ b/glsa-201412-30.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">varnish</product>
- <announced>December 15, 2014</announced>
- <revised>December 15, 2014: 1</revised>
+ <announced>2014-12-15</announced>
+ <revised>2014-12-15: 1</revised>
<bug>458888</bug>
<bug>489944</bug>
<access>local, remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0345">CVE-2013-0345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4484">CVE-2013-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0345">CVE-2013-0345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4484">CVE-2013-4484</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:10:40 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:10:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Dec 2014 11:43:22 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-15T11:43:22Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-31.xml b/glsa-201412-31.xml
index e125abbc..d7c275fc 100644
--- a/glsa-201412-31.xml
+++ b/glsa-201412-31.xml
@@ -4,8 +4,8 @@
<title>ZNC: Denial of Service</title>
<synopsis>Multiple vulnerabilities in ZNC could lead to Denial of Service.</synopsis>
<product type="ebuild">znc</product>
- <announced>December 19, 2014</announced>
- <revised>December 19, 2014: 1</revised>
+ <announced>2014-12-19</announced>
+ <revised>2014-12-19: 1</revised>
<bug>471738</bug>
<bug>507794</bug>
<access>remote</access>
@@ -39,11 +39,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2130">CVE-2013-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9403">CVE-2014-9403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2130">CVE-2013-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9403">CVE-2014-9403</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:41:24 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:41:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Dec 2014 00:46:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-19T00:46:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-32.xml b/glsa-201412-32.xml
index 8c1f7a26..05e7eb2d 100644
--- a/glsa-201412-32.xml
+++ b/glsa-201412-32.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>December 22, 2014</announced>
- <revised>December 22, 2014: 1</revised>
+ <announced>2014-12-22</announced>
+ <revised>2014-12-22: 1</revised>
<bug>511760</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3956">CVE-2014-3956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3956">CVE-2014-3956</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:42:47 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:42:47Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Dec 2014 14:46:39 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-22T14:46:39Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-33.xml b/glsa-201412-33.xml
index 7c7f0594..21697855 100644
--- a/glsa-201412-33.xml
+++ b/glsa-201412-33.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">pdns-recursor</product>
- <announced>December 22, 2014</announced>
- <revised>December 22, 2014: 1</revised>
+ <announced>2014-12-22</announced>
+ <revised>2014-12-22: 1</revised>
<bug>299942</bug>
<bug>404377</bug>
<bug>514946</bug>
@@ -46,14 +46,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009">CVE-2009-4009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010">CVE-2009-4010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193">CVE-2012-1193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601">CVE-2014-8601</uri>
- <uri link="http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recursor-configuration-file-guidance/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009">CVE-2009-4009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010">CVE-2009-4010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193">CVE-2012-1193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601">CVE-2014-8601</uri>
+ <uri link="https://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recursor-configuration-file-guidance/">
Related to recent DoS attacks: Recursor configuration file guidance
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:24 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Dec 2014 21:55:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:24Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-22T21:55:57Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-34.xml b/glsa-201412-34.xml
index 0e09f84a..bbd4379f 100644
--- a/glsa-201412-34.xml
+++ b/glsa-201412-34.xml
@@ -6,8 +6,8 @@
could result in remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 2</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 2</revised>
<bug>533076</bug>
<access>remote</access>
<affected>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293">CVE-2014-9293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294">CVE-2014-9294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295">CVE-2014-9295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296">CVE-2014-9296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293">CVE-2014-9293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294">CVE-2014-9294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295">CVE-2014-9295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296">CVE-2014-9296</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Dec 2014 23:07:31 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 19:20:24 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-23T23:07:31Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T19:20:24Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-35.xml b/glsa-201412-35.xml
index 577ec5ad..905248fb 100644
--- a/glsa-201412-35.xml
+++ b/glsa-201412-35.xml
@@ -6,8 +6,8 @@
attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">rsyslog</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>395709</bug>
<bug>491856</bug>
<bug>524058</bug>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4623">CVE-2011-4623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3634">CVE-2014-3634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3683">CVE-2014-3683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4623">CVE-2011-4623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3634">CVE-2014-3634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3683">CVE-2014-3683</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:54 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:04:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:54Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T20:04:37Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-36.xml b/glsa-201412-36.xml
index 4393c674..0e0b03ce 100644
--- a/glsa-201412-36.xml
+++ b/glsa-201412-36.xml
@@ -6,8 +6,8 @@
allows context-dependent attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>532204</bug>
<bug>533286</bug>
<access>local, remote</access>
@@ -41,10 +41,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8131">CVE-2014-8131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8135">CVE-2014-8135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8136">CVE-2014-8136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8131">CVE-2014-8131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8135">CVE-2014-8135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8136">CVE-2014-8136</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Dec 2014 14:21:18 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:40:55 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-24T14:21:18Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T20:40:55Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-37.xml b/glsa-201412-37.xml
index 04b6eef5..bed0bac8 100644
--- a/glsa-201412-37.xml
+++ b/glsa-201412-37.xml
@@ -6,8 +6,8 @@
which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>528922</bug>
<bug>529030</bug>
<bug>531666</bug>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3689">CVE-2014-3689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7840">CVE-2014-7840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8106">CVE-2014-8106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3689">CVE-2014-3689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7840">CVE-2014-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8106">CVE-2014-8106</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Dec 2014 03:02:15 +0000">
+ <metadata tag="requester" timestamp="2014-12-22T03:02:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:51:55 +0000">
+ <metadata tag="submitter" timestamp="2014-12-24T20:51:55Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201412-38.xml b/glsa-201412-38.xml
index fa9fb4b1..b43a4492 100644
--- a/glsa-201412-38.xml
+++ b/glsa-201412-38.xml
@@ -6,8 +6,8 @@
in privilege escalation or disclosure of information.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>529956</bug>
<bug>530784</bug>
<access>local, remote</access>
@@ -49,11 +49,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9018">CVE-2014-9018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9091">CVE-2014-9091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9018">CVE-2014-9018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9091">CVE-2014-9091</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Dec 2014 05:16:19 +0000">
+ <metadata tag="requester" timestamp="2014-12-12T05:16:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 00:40:23 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T00:40:23Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-39.xml b/glsa-201412-39.xml
index 394069a8..890867c0 100644
--- a/glsa-201412-39.xml
+++ b/glsa-201412-39.xml
@@ -6,8 +6,8 @@
which could result in Denial of Service or Man-in-the-Middle attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 26, 2014</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2014-12-26</announced>
+ <revised>2015-06-06: 2</revised>
<bug>494816</bug>
<bug>519264</bug>
<bug>525468</bug>
@@ -72,20 +72,20 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449">CVE-2013-6449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450">CVE-2013-6450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505">CVE-2014-3505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506">CVE-2014-3506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507">CVE-2014-3507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509">CVE-2014-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510">CVE-2014-3510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511">CVE-2014-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512">CVE-2014-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513">CVE-2014-3513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567">CVE-2014-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568">CVE-2014-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139">CVE-2014-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449">CVE-2013-6449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450">CVE-2013-6450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505">CVE-2014-3505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506">CVE-2014-3506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507">CVE-2014-3507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509">CVE-2014-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510">CVE-2014-3510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511">CVE-2014-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512">CVE-2014-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513">CVE-2014-3513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567">CVE-2014-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568">CVE-2014-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139">CVE-2014-5139</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Sep 2014 10:53:11 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:14:38 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-04T10:53:11Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:14:38Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-40.xml b/glsa-201412-40.xml
index 10eae877..6fd8213d 100644
--- a/glsa-201412-40.xml
+++ b/glsa-201412-40.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">flac</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>530288</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962">CVE-2014-8962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962">CVE-2014-8962</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Dec 2014 00:54:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 00:40:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-03T00:54:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T00:40:42Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-41.xml b/glsa-201412-41.xml
index 96f261ce..0bd48239 100644
--- a/glsa-201412-41.xml
+++ b/glsa-201412-41.xml
@@ -4,8 +4,8 @@
<title>OpenVPN: Denial of Service</title>
<synopsis>A vulnerability in OpenVPN could lead to Denial of Service.</synopsis>
<product type="ebuild">openvpn</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>531308</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8104">CVE-2014-8104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8104">CVE-2014-8104</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Dec 2014 00:38:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 17:10:38 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-04T00:38:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T17:10:38Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-42.xml b/glsa-201412-42.xml
index 414433f0..154aa2a3 100644
--- a/glsa-201412-42.xml
+++ b/glsa-201412-42.xml
@@ -6,8 +6,8 @@
in Denial of Service.
</synopsis>
<product type="ebuild">xen</product>
- <announced>December 26, 2014</announced>
- <revised>December 31, 2014: 2</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-31: 2</revised>
<bug>523524</bug>
<bug>524200</bug>
<access>local</access>
@@ -49,13 +49,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154">CVE-2014-7154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155">CVE-2014-7155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156">CVE-2014-7156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188">CVE-2014-7188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154">CVE-2014-7154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155">CVE-2014-7155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156">CVE-2014-7156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188">CVE-2014-7188</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Oct 2014 01:33:19 +0000">
+ <metadata tag="requester" timestamp="2014-10-15T01:33:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 31 Dec 2014 14:18:28 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-31T14:18:28Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-43.xml b/glsa-201412-43.xml
index bf789027..8a7474b9 100644
--- a/glsa-201412-43.xml
+++ b/glsa-201412-43.xml
@@ -6,8 +6,8 @@
resulting in remote code execution or Denial of Service.
</synopsis>
<product type="ebuild">mupdf</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>358029</bug>
<bug>498876</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2013">CVE-2014-2013</uri>
- <uri link="http://secunia.com/secunia_research/2011-12/">Secunia Research:
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2013">CVE-2014-2013</uri>
+ <uri link="https://secunia.com/secunia_research/2011-12/">Secunia Research:
MuPDF Two Integer Overflow Vulnerabilities
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:03 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:03Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 17:54:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T17:54:11Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-44.xml b/glsa-201412-44.xml
index 238abd70..322a50c1 100644
--- a/glsa-201412-44.xml
+++ b/glsa-201412-44.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">policycoreutils</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>509896</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3215">CVE-2014-3215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3215">CVE-2014-3215</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Aug 2014 04:53:45 +0000">
+ <metadata tag="requester" timestamp="2014-08-19T04:53:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 18:53:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T18:53:38Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-45.xml b/glsa-201412-45.xml
index f2403710..1db552f5 100644
--- a/glsa-201412-45.xml
+++ b/glsa-201412-45.xml
@@ -6,8 +6,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">facter</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>514476</bug>
<access>local</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Aug 2014 21:34:38 +0000">
+ <metadata tag="requester" timestamp="2014-08-16T21:34:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 18:59:01 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T18:59:01Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-46.xml b/glsa-201412-46.xml
index b9ad0d5e..45ae0c05 100644
--- a/glsa-201412-46.xml
+++ b/glsa-201412-46.xml
@@ -6,8 +6,8 @@
could cause Denial of Service.
</synopsis>
<product type="ebuild">lcms</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>479874</bug>
<bug>507788</bug>
<access>remote</access>
@@ -51,9 +51,9 @@
<p>NOTE: Gentoo has discontinued support for the LittleCMS 1.9 branch. </p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4276">CVE-2013-4276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4276">CVE-2013-4276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 21:58:45 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 19:04:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T21:58:45Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T19:04:58Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-47.xml b/glsa-201412-47.xml
index 7154eca8..f0c8cfaa 100644
--- a/glsa-201412-47.xml
+++ b/glsa-201412-47.xml
@@ -7,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">torque</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>372959</bug>
<bug>378805</bug>
<bug>390167</bug>
@@ -65,15 +65,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2193">CVE-2011-2193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2907">CVE-2011-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4925">CVE-2011-4925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319">CVE-2013-4319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4495">CVE-2013-4495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0749">CVE-2014-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2193">CVE-2011-2193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2907">CVE-2011-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4925">CVE-2011-4925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319">CVE-2013-4319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4495">CVE-2013-4495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0749">CVE-2014-0749</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 19:24:57 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T19:24:57Z">ackle</metadata>
</glsa>
diff --git a/glsa-201412-48.xml b/glsa-201412-48.xml
index f6dad952..2a79eea7 100644
--- a/glsa-201412-48.xml
+++ b/glsa-201412-48.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">file</product>
- <announced>December 27, 2014</announced>
- <revised>December 27, 2014: 1</revised>
+ <announced>2014-12-27</announced>
+ <revised>2014-12-27: 1</revised>
<bug>532686</bug>
<access>local, remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8117">CVE-2014-8117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8117">CVE-2014-8117</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Dec 2014 19:35:05 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Dec 2014 11:11:58 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-26T19:35:05Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-27T11:11:58Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-49.xml b/glsa-201412-49.xml
index 7ffe9d43..fab26bb2 100644
--- a/glsa-201412-49.xml
+++ b/glsa-201412-49.xml
@@ -7,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">fish</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>509044</bug>
<access>local, remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2905">CVE-2014-2905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2906">CVE-2014-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2914">CVE-2014-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3219">CVE-2014-3219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2905">CVE-2014-2905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2906">CVE-2014-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2914">CVE-2014-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3219">CVE-2014-3219</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Dec 2014 19:46:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 08:15:27 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-26T19:46:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T08:15:27Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-50.xml b/glsa-201412-50.xml
index c5e4cf7f..15f49a67 100644
--- a/glsa-201412-50.xml
+++ b/glsa-201412-50.xml
@@ -6,8 +6,8 @@
remote attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">getmail</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>524684</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7273">CVE-2014-7273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7274">CVE-2014-7274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7275">CVE-2014-7275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7273">CVE-2014-7273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7274">CVE-2014-7274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7275">CVE-2014-7275</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 09:32:32 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 17:37:18 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T09:32:32Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T17:37:18Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-51.xml b/glsa-201412-51.xml
index bfd67d8b..2982e713 100644
--- a/glsa-201412-51.xml
+++ b/glsa-201412-51.xml
@@ -7,8 +7,8 @@
allow an authenticated user to gain escalated privileges.
</synopsis>
<product type="ebuild">asterisk,dos,escalated,acl</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>530056</bug>
<bug>532242</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412">CVE-2014-8412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414">CVE-2014-8414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417">CVE-2014-8417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418">CVE-2014-8418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374">CVE-2014-9374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412">CVE-2014-8412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414">CVE-2014-8414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417">CVE-2014-8417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418">CVE-2014-8418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374">CVE-2014-9374</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 15:16:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 18:45:10 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T15:16:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T18:45:10Z">K_F</metadata>
</glsa>
diff --git a/glsa-201412-52.xml b/glsa-201412-52.xml
index afbc7e4b..9ecd83e4 100644
--- a/glsa-201412-52.xml
+++ b/glsa-201412-52.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>522968</bug>
<bug>529100</bug>
<access>remote</access>
@@ -43,19 +43,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6421">CVE-2014-6421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6422">CVE-2014-6422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6423">CVE-2014-6423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6424">CVE-2014-6424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6425">CVE-2014-6425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6426">CVE-2014-6426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6427">CVE-2014-6427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6428">CVE-2014-6428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6429">CVE-2014-6429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6430">CVE-2014-6430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6431">CVE-2014-6431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6432">CVE-2014-6432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6421">CVE-2014-6421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6422">CVE-2014-6422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6423">CVE-2014-6423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6424">CVE-2014-6424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6425">CVE-2014-6425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6426">CVE-2014-6426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6427">CVE-2014-6427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6428">CVE-2014-6428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6429">CVE-2014-6429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6430">CVE-2014-6430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6431">CVE-2014-6431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6432">CVE-2014-6432</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 19:18:05 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 22:15:09 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T19:18:05Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T22:15:09Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201412-53.xml b/glsa-201412-53.xml
index fe05d50d..c39db737 100644
--- a/glsa-201412-53.xml
+++ b/glsa-201412-53.xml
@@ -6,8 +6,8 @@
resulting in arbitrary code execution or a Denial of Service condition.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>December 31, 2014</announced>
- <revised>December 31, 2014: 1</revised>
+ <announced>2014-12-31</announced>
+ <revised>2014-12-31: 1</revised>
<bug>516334</bug>
<bug>517936</bug>
<bug>519518</bug>
@@ -47,11 +47,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4341">CVE-2014-4341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4343">CVE-2014-4343</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4345">CVE-2014-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5351">CVE-2014-5351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4341">CVE-2014-4341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4343">CVE-2014-4343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4345">CVE-2014-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5351">CVE-2014-5351</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 07:58:32 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 31 Dec 2014 14:20:08 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T07:58:32Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-31T14:20:08Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201502-01.xml b/glsa-201502-01.xml
index 6fb19c2e..1833b8c4 100644
--- a/glsa-201502-01.xml
+++ b/glsa-201502-01.xml
@@ -6,8 +6,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>February 06, 2015</announced>
- <revised>February 06, 2015: 1</revised>
+ <announced>2015-02-06</announced>
+ <revised>2015-02-06: 1</revised>
<bug>500262</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9497">CVE-2014-9497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9497">CVE-2014-9497</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 00:30:07 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T00:30:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Feb 2015 14:40:46 +0000">
+ <metadata tag="submitter" timestamp="2015-02-06T14:40:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201502-02.xml b/glsa-201502-02.xml
index 873d4e01..9cf280e6 100644
--- a/glsa-201502-02.xml
+++ b/glsa-201502-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>February 06, 2015</announced>
- <revised>February 06, 2015: 1</revised>
+ <announced>2015-02-06</announced>
+ <revised>2015-02-06: 1</revised>
<bug>536562</bug>
<bug>537378</bug>
<bug>537426</bug>
@@ -49,35 +49,35 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0301">CVE-2015-0301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0302">CVE-2015-0302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0303">CVE-2015-0303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0304">CVE-2015-0304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0305">CVE-2015-0305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0306">CVE-2015-0306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0307">CVE-2015-0307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0308">CVE-2015-0308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0309">CVE-2015-0309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0310">CVE-2015-0310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0311">CVE-2015-0311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0314">CVE-2015-0314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0315">CVE-2015-0315</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0316">CVE-2015-0316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0317">CVE-2015-0317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0318">CVE-2015-0318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0319">CVE-2015-0319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0320">CVE-2015-0320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0321">CVE-2015-0321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0322">CVE-2015-0322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0323">CVE-2015-0323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0324">CVE-2015-0324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0325">CVE-2015-0325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0326">CVE-2015-0326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0327">CVE-2015-0327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0328">CVE-2015-0328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0329">CVE-2015-0329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0330">CVE-2015-0330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0301">CVE-2015-0301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0302">CVE-2015-0302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0303">CVE-2015-0303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0304">CVE-2015-0304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0305">CVE-2015-0305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0306">CVE-2015-0306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0307">CVE-2015-0307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0308">CVE-2015-0308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0309">CVE-2015-0309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0310">CVE-2015-0310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0311">CVE-2015-0311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0314">CVE-2015-0314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0315">CVE-2015-0315</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0316">CVE-2015-0316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0317">CVE-2015-0317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0318">CVE-2015-0318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0319">CVE-2015-0319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0320">CVE-2015-0320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0321">CVE-2015-0321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0322">CVE-2015-0322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0323">CVE-2015-0323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0324">CVE-2015-0324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0325">CVE-2015-0325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0326">CVE-2015-0326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0327">CVE-2015-0327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0328">CVE-2015-0328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0329">CVE-2015-0329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0330">CVE-2015-0330</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 18:35:19 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Feb 2015 19:04:05 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T18:35:19Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-06T19:04:05Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-03.xml b/glsa-201502-03.xml
index af06cfe1..db0ee825 100644
--- a/glsa-201502-03.xml
+++ b/glsa-201502-03.xml
@@ -7,8 +7,8 @@
denial of service condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>531998</bug>
<access>remote</access>
<affected>
@@ -43,14 +43,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3214">CVE-2014-3214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8500">CVE-2014-8500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8680">CVE-2014-8680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3214">CVE-2014-3214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8500">CVE-2014-8500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8680">CVE-2014-8680</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 00:38:51 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T00:38:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 16:05:19 +0000">
+ <metadata tag="submitter" timestamp="2015-02-07T16:05:19Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201502-04.xml b/glsa-201502-04.xml
index 1a400f1b..c4442408 100644
--- a/glsa-201502-04.xml
+++ b/glsa-201502-04.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>498064</bug>
<bug>499632</bug>
<bug>503012</bug>
@@ -70,40 +70,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6451">CVE-2013-6451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6452">CVE-2013-6452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6453">CVE-2013-6453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6454">CVE-2013-6454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6472">CVE-2013-6472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1610">CVE-2014-1610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2242">CVE-2014-2242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2243">CVE-2014-2243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2244">CVE-2014-2244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2665">CVE-2014-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2853">CVE-2014-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5241">CVE-2014-5241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5242">CVE-2014-5242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5243">CVE-2014-5243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7199">CVE-2014-7199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7295">CVE-2014-7295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9276">CVE-2014-9276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9277">CVE-2014-9277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9475">CVE-2014-9475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9476">CVE-2014-9476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9477">CVE-2014-9477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9478">CVE-2014-9478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9479">CVE-2014-9479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9480">CVE-2014-9480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9481">CVE-2014-9481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9487">CVE-2014-9487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9507">CVE-2014-9507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6451">CVE-2013-6451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6452">CVE-2013-6452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6453">CVE-2013-6453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6454">CVE-2013-6454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6472">CVE-2013-6472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1610">CVE-2014-1610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2242">CVE-2014-2242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2243">CVE-2014-2243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2244">CVE-2014-2244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2665">CVE-2014-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2853">CVE-2014-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5241">CVE-2014-5241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5242">CVE-2014-5242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5243">CVE-2014-5243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7199">CVE-2014-7199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7295">CVE-2014-7295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9276">CVE-2014-9276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9277">CVE-2014-9277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9475">CVE-2014-9475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9476">CVE-2014-9476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9477">CVE-2014-9477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9478">CVE-2014-9478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9479">CVE-2014-9479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9480">CVE-2014-9480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9481">CVE-2014-9481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9487">CVE-2014-9487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9507">CVE-2014-9507</uri>
<uri link="https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-June/000155.html">
MediaWiki Security and Maintenance Releases: 1.19.17, 1.21.11, 1.22.8 and
1.23.1
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Feb 2014 10:34:22 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 17:27:17 +0000">
+ <metadata tag="requester" timestamp="2014-02-09T10:34:22Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T17:27:17Z">
sdamashek
</metadata>
</glsa>
diff --git a/glsa-201502-05.xml b/glsa-201502-05.xml
index e5918c01..7f7bc74f 100644
--- a/glsa-201502-05.xml
+++ b/glsa-201502-05.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>534660</bug>
<access>remote</access>
<affected>
@@ -55,11 +55,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8767">CVE-2014-8767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8768">CVE-2014-8768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8769">CVE-2014-8769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9140">CVE-2014-9140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8767">CVE-2014-8767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8768">CVE-2014-8768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8769">CVE-2014-8769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9140">CVE-2014-9140</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 19:41:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:04:53 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T19:41:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:04:53Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-06.xml b/glsa-201502-06.xml
index bc10035f..7d0eacb5 100644
--- a/glsa-201502-06.xml
+++ b/glsa-201502-06.xml
@@ -6,8 +6,8 @@
attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>522994</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3616">CVE-2014-3616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3616">CVE-2014-3616</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Jan 2015 00:39:58 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:30:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-05T00:39:58Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:30:19Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-07.xml b/glsa-201502-07.xml
index 908273bf..abbde33b 100644
--- a/glsa-201502-07.xml
+++ b/glsa-201502-07.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libevent</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>535774</bug>
<access>local, remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6272">CVE-2014-6272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6272">CVE-2014-6272</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 19:27:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:31:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T19:27:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:31:58Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-08.xml b/glsa-201502-08.xml
index 180df600..e5432f6b 100644
--- a/glsa-201502-08.xml
+++ b/glsa-201502-08.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>492582</bug>
<bug>515234</bug>
<bug>531832</bug>
@@ -47,21 +47,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0848">CVE-2013-0848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0851">CVE-2013-0851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0852">CVE-2013-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4609">CVE-2014-4609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0848">CVE-2013-0848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0851">CVE-2013-0851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0852">CVE-2013-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4609">CVE-2014-4609</uri>
<uri link="https://libav.org/news.html#0.8.9">Libav News November 2, 2013</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jan 2015 02:04:44 +0000">
+ <metadata tag="requester" timestamp="2015-01-07T02:04:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:33:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:33:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-09.xml b/glsa-201502-09.xml
index d4d63b3a..648bc78c 100644
--- a/glsa-201502-09.xml
+++ b/glsa-201502-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">antiword</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>531404</bug>
<access>remote</access>
<affected>
@@ -40,8 +40,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8123">CVE-2014-8123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8123">CVE-2014-8123</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2015 21:48:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:39:20 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-11T21:48:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:39:20Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-10.xml b/glsa-201502-10.xml
index 0ed4ed4a..843be675 100644
--- a/glsa-201502-10.xml
+++ b/glsa-201502-10.xml
@@ -6,8 +6,8 @@
in execution of arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>February 15, 2015</announced>
- <revised>January 03, 2017: 3</revised>
+ <announced>2015-02-15</announced>
+ <revised>2017-01-03: 3</revised>
<bug>531264</bug>
<bug>533358</bug>
<access>local, remote</access>
@@ -62,13 +62,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9495">CVE-2014-9495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9495">CVE-2014-9495</uri>
<uri link="http://www.libpng.org/pub/png/src/libpng-1.6.15-README.txt">
libpng 1.6.15 Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 22:55:48 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T22:55:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:39:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:39:38Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-11.xml b/glsa-201502-11.xml
index 54b12022..42c687d5 100644
--- a/glsa-201502-11.xml
+++ b/glsa-201502-11.xml
@@ -6,8 +6,8 @@
could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>February 15, 2015</announced>
- <revised>February 15, 2015: 1</revised>
+ <announced>2015-02-15</announced>
+ <revised>2015-02-15: 1</revised>
<bug>530512</bug>
<bug>536010</bug>
<access>remote</access>
@@ -51,9 +51,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9112">CVE-2014-9112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1197">CVE-2015-1197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9112">CVE-2014-9112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1197">CVE-2015-1197</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 20:25:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Feb 2015 14:35:14 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T20:25:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-15T14:35:14Z">ackle</metadata>
</glsa>
diff --git a/glsa-201502-12.xml b/glsa-201502-12.xml
index 82dc636f..513a4908 100644
--- a/glsa-201502-12.xml
+++ b/glsa-201502-12.xml
@@ -7,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">oracle jre, oracle jdk</product>
- <announced>February 15, 2015</announced>
- <revised>February 15, 2015: 1</revised>
+ <announced>2015-02-15</announced>
+ <revised>2015-02-15: 1</revised>
<bug>507798</bug>
<bug>508716</bug>
<bug>517220</bug>
@@ -73,90 +73,90 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432">CVE-2014-0432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448">CVE-2014-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449">CVE-2014-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454">CVE-2014-0454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455">CVE-2014-0455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463">CVE-2014-0463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464">CVE-2014-0464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401">CVE-2014-2401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402">CVE-2014-2402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409">CVE-2014-2409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410">CVE-2014-2410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413">CVE-2014-2413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420">CVE-2014-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422">CVE-2014-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428">CVE-2014-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483">CVE-2014-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490">CVE-2014-2490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208">CVE-2014-4208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209">CVE-2014-4209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216">CVE-2014-4216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218">CVE-2014-4218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219">CVE-2014-4219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220">CVE-2014-4220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221">CVE-2014-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223">CVE-2014-4223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227">CVE-2014-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244">CVE-2014-4244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247">CVE-2014-4247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252">CVE-2014-4252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262">CVE-2014-4262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263">CVE-2014-4263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264">CVE-2014-4264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265">CVE-2014-4265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266">CVE-2014-4266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268">CVE-2014-4268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288">CVE-2014-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456">CVE-2014-6456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457">CVE-2014-6457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458">CVE-2014-6458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466">CVE-2014-6466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468">CVE-2014-6468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476">CVE-2014-6476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485">CVE-2014-6485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492">CVE-2014-6492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493">CVE-2014-6493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502">CVE-2014-6502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503">CVE-2014-6503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504">CVE-2014-6504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506">CVE-2014-6506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511">CVE-2014-6511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512">CVE-2014-6512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513">CVE-2014-6513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515">CVE-2014-6515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517">CVE-2014-6517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519">CVE-2014-6519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527">CVE-2014-6527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531">CVE-2014-6531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532">CVE-2014-6532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558">CVE-2014-6558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562">CVE-2014-6562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432">CVE-2014-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448">CVE-2014-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449">CVE-2014-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454">CVE-2014-0454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455">CVE-2014-0455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463">CVE-2014-0463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464">CVE-2014-0464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401">CVE-2014-2401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402">CVE-2014-2402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409">CVE-2014-2409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410">CVE-2014-2410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413">CVE-2014-2413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420">CVE-2014-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422">CVE-2014-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428">CVE-2014-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483">CVE-2014-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490">CVE-2014-2490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208">CVE-2014-4208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209">CVE-2014-4209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216">CVE-2014-4216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218">CVE-2014-4218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219">CVE-2014-4219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220">CVE-2014-4220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221">CVE-2014-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223">CVE-2014-4223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227">CVE-2014-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244">CVE-2014-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247">CVE-2014-4247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252">CVE-2014-4252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262">CVE-2014-4262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263">CVE-2014-4263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264">CVE-2014-4264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265">CVE-2014-4265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266">CVE-2014-4266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268">CVE-2014-4268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288">CVE-2014-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456">CVE-2014-6456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457">CVE-2014-6457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458">CVE-2014-6458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466">CVE-2014-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468">CVE-2014-6468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476">CVE-2014-6476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485">CVE-2014-6485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492">CVE-2014-6492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493">CVE-2014-6493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502">CVE-2014-6502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503">CVE-2014-6503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504">CVE-2014-6504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506">CVE-2014-6506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511">CVE-2014-6511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512">CVE-2014-6512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513">CVE-2014-6513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515">CVE-2014-6515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517">CVE-2014-6517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519">CVE-2014-6519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527">CVE-2014-6527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531">CVE-2014-6531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532">CVE-2014-6532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558">CVE-2014-6558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562">CVE-2014-6562</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 22:53:14 +0000">
+ <metadata tag="requester" timestamp="2014-06-17T22:53:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Feb 2015 14:36:11 +0000">
+ <metadata tag="submitter" timestamp="2015-02-15T14:36:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201502-13.xml b/glsa-201502-13.xml
index 6d140932..2196b07f 100644
--- a/glsa-201502-13.xml
+++ b/glsa-201502-13.xml
@@ -7,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>February 17, 2015</announced>
- <revised>February 17, 2015: 1</revised>
+ <announced>2015-02-17</announced>
+ <revised>2015-02-17: 1</revised>
<bug>537366</bug>
<bug>539094</bug>
<access>remote</access>
@@ -45,47 +45,47 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924">CVE-2014-7924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925">CVE-2014-7925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927">CVE-2014-7927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928">CVE-2014-7928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929">CVE-2014-7929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930">CVE-2014-7930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931">CVE-2014-7931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932">CVE-2014-7932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933">CVE-2014-7933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934">CVE-2014-7934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935">CVE-2014-7935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936">CVE-2014-7936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938">CVE-2014-7938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939">CVE-2014-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941">CVE-2014-7941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942">CVE-2014-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943">CVE-2014-7943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944">CVE-2014-7944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945">CVE-2014-7945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946">CVE-2014-7946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947">CVE-2014-7947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948">CVE-2014-7948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646">CVE-2014-9646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647">CVE-2014-9647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648">CVE-2014-9648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205">CVE-2015-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209">CVE-2015-1209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210">CVE-2015-1210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211">CVE-2015-1211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212">CVE-2015-1212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346">CVE-2015-1346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359">CVE-2015-1359</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360">CVE-2015-1360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361">CVE-2015-1361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924">CVE-2014-7924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925">CVE-2014-7925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927">CVE-2014-7927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928">CVE-2014-7928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929">CVE-2014-7929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930">CVE-2014-7930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931">CVE-2014-7931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932">CVE-2014-7932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933">CVE-2014-7933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934">CVE-2014-7934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935">CVE-2014-7935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936">CVE-2014-7936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938">CVE-2014-7938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939">CVE-2014-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941">CVE-2014-7941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942">CVE-2014-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943">CVE-2014-7943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944">CVE-2014-7944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945">CVE-2014-7945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946">CVE-2014-7946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947">CVE-2014-7947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948">CVE-2014-7948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646">CVE-2014-9646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647">CVE-2014-9647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648">CVE-2014-9648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205">CVE-2015-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209">CVE-2015-1209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210">CVE-2015-1210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211">CVE-2015-1211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212">CVE-2015-1212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346">CVE-2015-1346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359">CVE-2015-1359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360">CVE-2015-1360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361">CVE-2015-1361</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Jan 2015 22:37:02 +0000">
+ <metadata tag="requester" timestamp="2015-01-23T22:37:02Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Feb 2015 22:01:01 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-17T22:01:01Z">K_F</metadata>
</glsa>
diff --git a/glsa-201502-14.xml b/glsa-201502-14.xml
index b268af8c..62154892 100644
--- a/glsa-201502-14.xml
+++ b/glsa-201502-14.xml
@@ -4,8 +4,8 @@
<title>grep: Denial of Service</title>
<synopsis>A vulnerability in grep could result in Denial of Service. </synopsis>
<product type="ebuild">grep,dos</product>
- <announced>February 25, 2015</announced>
- <revised>February 25, 2015: 1</revised>
+ <announced>2015-02-25</announced>
+ <revised>2015-02-25: 1</revised>
<bug>537046</bug>
<access>local</access>
<affected>
@@ -38,10 +38,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1345">CVE-2015-1345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1345">CVE-2015-1345</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Feb 2015 06:32:56 +0000">
+ <metadata tag="requester" timestamp="2015-02-24T06:32:56Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Feb 2015 10:22:12 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-25T10:22:12Z">K_F</metadata>
</glsa>
diff --git a/glsa-201502-15.xml b/glsa-201502-15.xml
index dd57e80f..f65dd09c 100644
--- a/glsa-201502-15.xml
+++ b/glsa-201502-15.xml
@@ -7,8 +7,8 @@
restrictions, cause a Denial of Service or execute arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>February 25, 2015</announced>
- <revised>February 25, 2015: 1</revised>
+ <announced>2015-02-25</announced>
+ <revised>2015-02-25: 1</revised>
<bug>479868</bug>
<bug>491070</bug>
<bug>493664</bug>
@@ -49,20 +49,20 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150">CVE-2012-6150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4124">CVE-2013-4124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4408">CVE-2013-4408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4475">CVE-2013-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4476">CVE-2013-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4496">CVE-2013-4496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178">CVE-2014-0178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239">CVE-2014-0239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0244">CVE-2014-0244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3493">CVE-2014-3493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0240">CVE-2015-0240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150">CVE-2012-6150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4124">CVE-2013-4124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4408">CVE-2013-4408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4475">CVE-2013-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4476">CVE-2013-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4496">CVE-2013-4496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178">CVE-2014-0178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239">CVE-2014-0239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0244">CVE-2014-0244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3493">CVE-2014-3493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0240">CVE-2015-0240</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 04:10:53 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T04:10:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Feb 2015 22:04:57 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-25T22:04:57Z">K_F</metadata>
</glsa>
diff --git a/glsa-201503-01.xml b/glsa-201503-01.xml
index a52da44a..bb4fcc4c 100644
--- a/glsa-201503-01.xml
+++ b/glsa-201503-01.xml
@@ -6,8 +6,8 @@
which could could allow an attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">jasper</product>
- <announced>March 06, 2015</announced>
- <revised>March 06, 2015: 1</revised>
+ <announced>2015-03-06</announced>
+ <revised>2015-03-06: 1</revised>
<bug>531688</bug>
<bug>533744</bug>
<bug>537530</bug>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8137">CVE-2014-8137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8138">CVE-2014-8138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8157">CVE-2014-8157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8158">CVE-2014-8158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9029">CVE-2014-9029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8137">CVE-2014-8137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8138">CVE-2014-8138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8157">CVE-2014-8157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8158">CVE-2014-8158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9029">CVE-2014-9029</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jan 2015 23:22:20 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Mar 2015 15:11:02 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-01-07T23:22:20Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-06T15:11:02Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201503-02.xml b/glsa-201503-02.xml
index 61eb02b4..9133e2b9 100644
--- a/glsa-201503-02.xml
+++ b/glsa-201503-02.xml
@@ -6,8 +6,8 @@
local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>March 07, 2015</announced>
- <revised>March 07, 2015: 1</revised>
+ <announced>2015-03-07</announced>
+ <revised>2015-03-07: 1</revised>
<bug>539482</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0245">CVE-2015-0245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0245">CVE-2015-0245</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 04:08:15 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T04:08:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2015 08:59:46 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-07T08:59:46Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201503-03.xml b/glsa-201503-03.xml
index bb2b2e67..e527a11b 100644
--- a/glsa-201503-03.xml
+++ b/glsa-201503-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been discovered in PHP, the worst of
which could lead to remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 08, 2015</announced>
- <revised>August 22, 2015: 2</revised>
+ <product type="ebuild"/>
+ <announced>2015-03-08</announced>
+ <revised>2015-08-22: 2</revised>
<bug>530820</bug>
<bug>532914</bug>
<bug>533998</bug>
@@ -68,15 +68,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8142">CVE-2014-8142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9425">CVE-2014-9425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9427">CVE-2014-9427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0232">CVE-2015-0232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8142">CVE-2014-8142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9425">CVE-2014-9425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9427">CVE-2014-9427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0232">CVE-2015-0232</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 01:51:48 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T01:51:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:32:31 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-08-22T22:32:31Z">K_F</metadata>
</glsa>
diff --git a/glsa-201503-04.xml b/glsa-201503-04.xml
index 1c1d0c55..59ecc437 100644
--- a/glsa-201503-04.xml
+++ b/glsa-201503-04.xml
@@ -7,8 +7,8 @@
a Denial of Service .
</synopsis>
<product type="ebuild">glibc</product>
- <announced>March 08, 2015</announced>
- <revised>March 08, 2015: 1</revised>
+ <announced>2015-03-08</announced>
+ <revised>2015-03-08: 1</revised>
<bug>431218</bug>
<bug>434408</bug>
<bug>454862</bug>
@@ -57,27 +57,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3404">CVE-2012-3404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3405">CVE-2012-3405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3406">CVE-2012-3406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3480">CVE-2012-3480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4412">CVE-2012-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4424">CVE-2012-4424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6656">CVE-2012-6656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0242">CVE-2013-0242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914">CVE-2013-1914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2207">CVE-2013-2207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4237">CVE-2013-4237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4332">CVE-2013-4332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4458">CVE-2013-4458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4788">CVE-2013-4788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4043">CVE-2014-4043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0235">CVE-2015-0235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3404">CVE-2012-3404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3405">CVE-2012-3405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3406">CVE-2012-3406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3480">CVE-2012-3480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4412">CVE-2012-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4424">CVE-2012-4424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6656">CVE-2012-6656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0242">CVE-2013-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914">CVE-2013-1914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2207">CVE-2013-2207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4237">CVE-2013-4237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4332">CVE-2013-4332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4458">CVE-2013-4458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4788">CVE-2013-4788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4043">CVE-2014-4043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0235">CVE-2015-0235</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 May 2014 23:06:40 +0000">
+ <metadata tag="requester" timestamp="2014-05-30T23:06:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2015 14:38:42 +0000">
+ <metadata tag="submitter" timestamp="2015-03-08T14:38:42Z">
creffett
</metadata>
</glsa>
diff --git a/glsa-201503-05.xml b/glsa-201503-05.xml
index bb3443d2..2c030d70 100644
--- a/glsa-201503-05.xml
+++ b/glsa-201503-05.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>March 08, 2015</announced>
- <revised>March 08, 2015: 1</revised>
+ <announced>2015-03-08</announced>
+ <revised>2015-03-08: 1</revised>
<bug>532152</bug>
<bug>539796</bug>
<access>remote</access>
@@ -41,29 +41,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9656">CVE-2014-9656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9657">CVE-2014-9657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9658">CVE-2014-9658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9659">CVE-2014-9659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9660">CVE-2014-9660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9661">CVE-2014-9661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9662">CVE-2014-9662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9663">CVE-2014-9663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9664">CVE-2014-9664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9665">CVE-2014-9665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9666">CVE-2014-9666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9667">CVE-2014-9667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9668">CVE-2014-9668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9669">CVE-2014-9669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9670">CVE-2014-9670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9671">CVE-2014-9671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9672">CVE-2014-9672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9673">CVE-2014-9673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9674">CVE-2014-9674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9675">CVE-2014-9675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9656">CVE-2014-9656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9657">CVE-2014-9657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9658">CVE-2014-9658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9659">CVE-2014-9659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9660">CVE-2014-9660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9661">CVE-2014-9661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9662">CVE-2014-9662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9663">CVE-2014-9663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9664">CVE-2014-9664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9665">CVE-2014-9665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9666">CVE-2014-9666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9667">CVE-2014-9667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9668">CVE-2014-9668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9669">CVE-2014-9669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9670">CVE-2014-9670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9671">CVE-2014-9671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9672">CVE-2014-9672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9673">CVE-2014-9673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9674">CVE-2014-9674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9675">CVE-2014-9675</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Feb 2015 01:14:38 +0000">
+ <metadata tag="requester" timestamp="2015-02-26T01:14:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2015 14:40:17 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-08T14:40:17Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201503-06.xml b/glsa-201503-06.xml
index be076ed6..6703fa28 100644
--- a/glsa-201503-06.xml
+++ b/glsa-201503-06.xml
@@ -6,8 +6,8 @@
in Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>March 14, 2015</announced>
- <revised>March 14, 2015: 1</revised>
+ <announced>2015-03-14</announced>
+ <revised>2015-03-14: 1</revised>
<bug>537560</bug>
<bug>539108</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9654">CVE-2014-9654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9654">CVE-2014-9654</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 04:20:24 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T04:20:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2015 18:20:46 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-14T18:20:46Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201503-07.xml b/glsa-201503-07.xml
index 4214e35f..8ebb9e29 100644
--- a/glsa-201503-07.xml
+++ b/glsa-201503-07.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">hivex</product>
- <announced>March 14, 2015</announced>
- <revised>March 14, 2015: 1</revised>
+ <announced>2015-03-14</announced>
+ <revised>2015-03-14: 1</revised>
<bug>490990</bug>
<access>local, remote</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9273">CVE-2014-9273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9273">CVE-2014-9273</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 23:12:47 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T23:12:47Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2015 18:22:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-03-14T18:22:22Z">ackle</metadata>
</glsa>
diff --git a/glsa-201503-08.xml b/glsa-201503-08.xml
index 5d2ece8c..67a1de6b 100644
--- a/glsa-201503-08.xml
+++ b/glsa-201503-08.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">file,Dos</product>
- <announced>March 16, 2015</announced>
- <revised>March 16, 2015: 1</revised>
+ <announced>2015-03-16</announced>
+ <revised>2015-03-16: 1</revised>
<bug>503582</bug>
<bug>532768</bug>
<access>local, remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9620">CVE-2014-9620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9621">CVE-2014-9621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9620">CVE-2014-9620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9621">CVE-2014-9621</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Jan 2015 02:25:52 +0000">
+ <metadata tag="requester" timestamp="2015-01-18T02:25:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2015 19:34:27 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-16T19:34:27Z">K_F</metadata>
</glsa>
diff --git a/glsa-201503-09.xml b/glsa-201503-09.xml
index e485df5d..564336c2 100644
--- a/glsa-201503-09.xml
+++ b/glsa-201503-09.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE,DoS</product>
- <announced>March 16, 2015</announced>
- <revised>March 16, 2015: 1</revised>
+ <announced>2015-03-16</announced>
+ <revised>2015-03-16: 1</revised>
<bug>543112</bug>
<access>remote</access>
<affected>
@@ -46,18 +46,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0332">CVE-2015-0332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0333">CVE-2015-0333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0334">CVE-2015-0334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0335">CVE-2015-0335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0336">CVE-2015-0336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0337">CVE-2015-0337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0338">CVE-2015-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0339">CVE-2015-0339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0340">CVE-2015-0340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0341">CVE-2015-0341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0342">CVE-2015-0342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0332">CVE-2015-0332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0333">CVE-2015-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0334">CVE-2015-0334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0335">CVE-2015-0335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0336">CVE-2015-0336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0337">CVE-2015-0337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0338">CVE-2015-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0339">CVE-2015-0339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0340">CVE-2015-0340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0341">CVE-2015-0341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0342">CVE-2015-0342</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Mar 2015 00:47:30 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2015 21:01:07 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-03-14T00:47:30Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-16T21:01:07Z">K_F</metadata>
</glsa>
diff --git a/glsa-201503-10.xml b/glsa-201503-10.xml
index d37ba828..843b1806 100644
--- a/glsa-201503-10.xml
+++ b/glsa-201503-10.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">python</product>
- <announced>March 18, 2015</announced>
- <revised>June 17, 2015: 2</revised>
+ <announced>2015-03-18</announced>
+ <revised>2015-06-17: 2</revised>
<bug>495224</bug>
<bug>500518</bug>
<bug>505068</bug>
@@ -63,16 +63,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1752">CVE-2013-1752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7338">CVE-2013-7338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1912">CVE-2014-1912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2667">CVE-2014-2667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4616">CVE-2014-4616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7185">CVE-2014-7185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9365">CVE-2014-9365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1752">CVE-2013-1752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7338">CVE-2013-7338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1912">CVE-2014-1912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2667">CVE-2014-2667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4616">CVE-2014-4616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7185">CVE-2014-7185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9365">CVE-2014-9365</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Aug 2014 20:14:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Jun 2015 19:35:55 +0000">
+ <metadata tag="requester" timestamp="2014-08-18T20:14:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-17T19:35:55Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201503-11.xml b/glsa-201503-11.xml
index 676e30f5..8c888d68 100644
--- a/glsa-201503-11.xml
+++ b/glsa-201503-11.xml
@@ -6,8 +6,8 @@
in either Denial of Service or information disclosure.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 19, 2015</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2015-03-19</announced>
+ <revised>2015-06-06: 2</revised>
<bug>543552</bug>
<access>remote</access>
<affected>
@@ -94,23 +94,23 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0204">CVE-2015-0204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0207">CVE-2015-0207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0208">CVE-2015-0208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0209">CVE-2015-0209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0285">CVE-2015-0285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0287">CVE-2015-0287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0288">CVE-2015-0288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0289">CVE-2015-0289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0290">CVE-2015-0290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0291">CVE-2015-0291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0292">CVE-2015-0292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0293">CVE-2015-0293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1787">CVE-2015-1787</uri>
- <uri link="http://openssl.org/news/secadv_20150319.txt">OpenSSL Security
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0204">CVE-2015-0204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0207">CVE-2015-0207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0208">CVE-2015-0208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0209">CVE-2015-0209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0285">CVE-2015-0285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0287">CVE-2015-0287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0288">CVE-2015-0288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0289">CVE-2015-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0290">CVE-2015-0290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0291">CVE-2015-0291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0292">CVE-2015-0292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0293">CVE-2015-0293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1787">CVE-2015-1787</uri>
+ <uri link="https://openssl.org/news/secadv_20150319.txt">OpenSSL Security
Advisory [19 Mar 2015]
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Mar 2015 09:52:36 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:16:23 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-03-19T09:52:36Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:16:23Z">K_F</metadata>
</glsa>
diff --git a/glsa-201503-12.xml b/glsa-201503-12.xml
index 663d347e..348b47a4 100644
--- a/glsa-201503-12.xml
+++ b/glsa-201503-12.xml
@@ -7,8 +7,8 @@
security restrictions.
</synopsis>
<product type="ebuild">chromimu</product>
- <announced>March 22, 2015</announced>
- <revised>March 22, 2015: 1</revised>
+ <announced>2015-03-22</announced>
+ <revised>2015-03-22: 1</revised>
<bug>542090</bug>
<access>remote</access>
<affected>
@@ -44,27 +44,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1213">CVE-2015-1213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1214">CVE-2015-1214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1215">CVE-2015-1215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1216">CVE-2015-1216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1217">CVE-2015-1217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1218">CVE-2015-1218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1219">CVE-2015-1219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1220">CVE-2015-1220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1221">CVE-2015-1221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1222">CVE-2015-1222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1223">CVE-2015-1223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1224">CVE-2015-1224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1225">CVE-2015-1225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1226">CVE-2015-1226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1227">CVE-2015-1227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1228">CVE-2015-1228</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1229">CVE-2015-1229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1230">CVE-2015-1230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1231">CVE-2015-1231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1232">CVE-2015-1232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1213">CVE-2015-1213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1214">CVE-2015-1214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1215">CVE-2015-1215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1216">CVE-2015-1216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1217">CVE-2015-1217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1218">CVE-2015-1218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1219">CVE-2015-1219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1220">CVE-2015-1220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1221">CVE-2015-1221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1222">CVE-2015-1222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1223">CVE-2015-1223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1224">CVE-2015-1224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1225">CVE-2015-1225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1226">CVE-2015-1226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1227">CVE-2015-1227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1228">CVE-2015-1228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1229">CVE-2015-1229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1230">CVE-2015-1230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1231">CVE-2015-1231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1232">CVE-2015-1232</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 21 Mar 2015 14:01:08 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2015 22:04:32 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-21T14:01:08Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-22T22:04:32Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201503-13.xml b/glsa-201503-13.xml
index 7602aa62..a63167e3 100644
--- a/glsa-201503-13.xml
+++ b/glsa-201503-13.xml
@@ -7,8 +7,8 @@
arbitrary files, or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>March 29, 2015</announced>
- <revised>March 29, 2015: 1</revised>
+ <announced>2015-03-29</announced>
+ <revised>2015-03-29: 1</revised>
<bug>515254</bug>
<bug>537978</bug>
<access>local, remote</access>
@@ -48,11 +48,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9645">CVE-2014-9645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9645">CVE-2014-9645</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Mar 2015 18:23:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Mar 2015 17:08:00 +0000">
+ <metadata tag="requester" timestamp="2015-03-18T18:23:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-29T17:08:00Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201504-01.xml b/glsa-201504-01.xml
index 0373a7ab..7b5e6a6b 100644
--- a/glsa-201504-01.xml
+++ b/glsa-201504-01.xml
@@ -7,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">firefox thunderbird seamonkey</product>
- <announced>April 07, 2015</announced>
- <revised>April 08, 2015: 2</revised>
+ <announced>2015-04-07</announced>
+ <revised>2015-04-08: 2</revised>
<bug>489796</bug>
<bug>491234</bug>
<bug>493850</bug>
@@ -135,171 +135,170 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5590">CVE-2013-5590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5591">CVE-2013-5591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5592">CVE-2013-5592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5593">CVE-2013-5593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5595">CVE-2013-5595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5596">CVE-2013-5596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5597">CVE-2013-5597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5598">CVE-2013-5598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5599">CVE-2013-5599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5600">CVE-2013-5600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5601">CVE-2013-5601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5602">CVE-2013-5602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5603">CVE-2013-5603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5604">CVE-2013-5604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5609">CVE-2013-5609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5610">CVE-2013-5610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5612">CVE-2013-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5613">CVE-2013-5613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5614">CVE-2013-5614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5615">CVE-2013-5615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5616">CVE-2013-5616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5618">CVE-2013-5618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5619">CVE-2013-5619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6671">CVE-2013-6671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6672">CVE-2013-6672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6673">CVE-2013-6673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1477">CVE-2014-1477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1478">CVE-2014-1478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1479">CVE-2014-1479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1480">CVE-2014-1480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1481">CVE-2014-1481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1482">CVE-2014-1482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1483">CVE-2014-1483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1485">CVE-2014-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1486">CVE-2014-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1487">CVE-2014-1487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1488">CVE-2014-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1489">CVE-2014-1489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1490">CVE-2014-1490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1491">CVE-2014-1491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1492">CVE-2014-1492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1493">CVE-2014-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1494">CVE-2014-1494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1496">CVE-2014-1496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1497">CVE-2014-1497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1498">CVE-2014-1498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1499">CVE-2014-1499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1500">CVE-2014-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1502">CVE-2014-1502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1504">CVE-2014-1504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1505">CVE-2014-1505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1508">CVE-2014-1508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1509">CVE-2014-1509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1510">CVE-2014-1510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1511">CVE-2014-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1512">CVE-2014-1512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1513">CVE-2014-1513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1514">CVE-2014-1514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1518">CVE-2014-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1519">CVE-2014-1519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1520">CVE-2014-1520</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1522">CVE-2014-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1523">CVE-2014-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1524">CVE-2014-1524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1525">CVE-2014-1525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1526">CVE-2014-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1529">CVE-2014-1529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1530">CVE-2014-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1531">CVE-2014-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1532">CVE-2014-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1533">CVE-2014-1533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1534">CVE-2014-1534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1536">CVE-2014-1536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1537">CVE-2014-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1538">CVE-2014-1538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1539">CVE-2014-1539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1540">CVE-2014-1540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1541">CVE-2014-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1542">CVE-2014-1542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1543">CVE-2014-1543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1544">CVE-2014-1544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1545">CVE-2014-1545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1547">CVE-2014-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1548">CVE-2014-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1549">CVE-2014-1549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1550">CVE-2014-1550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1551">CVE-2014-1551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1552">CVE-2014-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1553">CVE-2014-1553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1554">CVE-2014-1554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1555">CVE-2014-1555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1556">CVE-2014-1556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1557">CVE-2014-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1558">CVE-2014-1558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1559">CVE-2014-1559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1560">CVE-2014-1560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1561">CVE-2014-1561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1562">CVE-2014-1562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1563">CVE-2014-1563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1564">CVE-2014-1564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1565">CVE-2014-1565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1566">CVE-2014-1566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1567">CVE-2014-1567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1568">CVE-2014-1568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1574">CVE-2014-1574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1575">CVE-2014-1575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1576">CVE-2014-1576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1577">CVE-2014-1577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1578">CVE-2014-1578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1580">CVE-2014-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1581">CVE-2014-1581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1582">CVE-2014-1582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1583">CVE-2014-1583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1584">CVE-2014-1584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1585">CVE-2014-1585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1586">CVE-2014-1586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1587">CVE-2014-1587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1588">CVE-2014-1588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1589">CVE-2014-1589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1590">CVE-2014-1590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1591">CVE-2014-1591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1592">CVE-2014-1592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1593">CVE-2014-1593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1594">CVE-2014-1594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5369">CVE-2014-5369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8631">CVE-2014-8631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8632">CVE-2014-8632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8634">CVE-2014-8634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8635">CVE-2014-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8636">CVE-2014-8636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8637">CVE-2014-8637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8638">CVE-2014-8638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8639">CVE-2014-8639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8640">CVE-2014-8640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8641">CVE-2014-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8642">CVE-2014-8642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0817">CVE-2015-0817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0818">CVE-2015-0818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0819">CVE-2015-0819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0820">CVE-2015-0820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0821">CVE-2015-0821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0822">CVE-2015-0822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0823">CVE-2015-0823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0824">CVE-2015-0824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0825">CVE-2015-0825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0826">CVE-2015-0826</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0827">CVE-2015-0827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0828">CVE-2015-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0829">CVE-2015-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0830">CVE-2015-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0831">CVE-2015-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0832">CVE-2015-0832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0833">CVE-2015-0833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0834">CVE-2015-0834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0835">CVE-2015-0835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0836">CVE-2015-0836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5590">CVE-2013-5590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5591">CVE-2013-5591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5592">CVE-2013-5592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5593">CVE-2013-5593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5595">CVE-2013-5595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5596">CVE-2013-5596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5597">CVE-2013-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5598">CVE-2013-5598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5599">CVE-2013-5599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5600">CVE-2013-5600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5601">CVE-2013-5601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5602">CVE-2013-5602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5603">CVE-2013-5603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5604">CVE-2013-5604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5609">CVE-2013-5609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5610">CVE-2013-5610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5612">CVE-2013-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5613">CVE-2013-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5614">CVE-2013-5614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5615">CVE-2013-5615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5616">CVE-2013-5616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5618">CVE-2013-5618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5619">CVE-2013-5619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6671">CVE-2013-6671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6672">CVE-2013-6672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6673">CVE-2013-6673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1477">CVE-2014-1477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1478">CVE-2014-1478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1479">CVE-2014-1479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1480">CVE-2014-1480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1481">CVE-2014-1481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1482">CVE-2014-1482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1483">CVE-2014-1483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1485">CVE-2014-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1486">CVE-2014-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1487">CVE-2014-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1488">CVE-2014-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1489">CVE-2014-1489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1490">CVE-2014-1490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1491">CVE-2014-1491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1492">CVE-2014-1492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1493">CVE-2014-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1494">CVE-2014-1494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1496">CVE-2014-1496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1497">CVE-2014-1497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1498">CVE-2014-1498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1499">CVE-2014-1499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1500">CVE-2014-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1502">CVE-2014-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1504">CVE-2014-1504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1505">CVE-2014-1505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1508">CVE-2014-1508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1509">CVE-2014-1509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1510">CVE-2014-1510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1511">CVE-2014-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1512">CVE-2014-1512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1513">CVE-2014-1513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1514">CVE-2014-1514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1518">CVE-2014-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1519">CVE-2014-1519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1520">CVE-2014-1520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1522">CVE-2014-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1523">CVE-2014-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1524">CVE-2014-1524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1525">CVE-2014-1525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1526">CVE-2014-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1529">CVE-2014-1529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1530">CVE-2014-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1531">CVE-2014-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1532">CVE-2014-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1533">CVE-2014-1533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1534">CVE-2014-1534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1536">CVE-2014-1536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1537">CVE-2014-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1538">CVE-2014-1538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1539">CVE-2014-1539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1540">CVE-2014-1540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1541">CVE-2014-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1542">CVE-2014-1542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1543">CVE-2014-1543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1544">CVE-2014-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1545">CVE-2014-1545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1547">CVE-2014-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1548">CVE-2014-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1549">CVE-2014-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1550">CVE-2014-1550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1551">CVE-2014-1551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1552">CVE-2014-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1553">CVE-2014-1553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1554">CVE-2014-1554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1555">CVE-2014-1555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1556">CVE-2014-1556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1557">CVE-2014-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1558">CVE-2014-1558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1559">CVE-2014-1559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1560">CVE-2014-1560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1561">CVE-2014-1561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1562">CVE-2014-1562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1563">CVE-2014-1563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1564">CVE-2014-1564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1565">CVE-2014-1565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1566">CVE-2014-1566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1567">CVE-2014-1567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1568">CVE-2014-1568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1574">CVE-2014-1574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1575">CVE-2014-1575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1576">CVE-2014-1576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1577">CVE-2014-1577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1578">CVE-2014-1578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1580">CVE-2014-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1581">CVE-2014-1581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1582">CVE-2014-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1583">CVE-2014-1583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1584">CVE-2014-1584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1585">CVE-2014-1585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1586">CVE-2014-1586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1587">CVE-2014-1587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1588">CVE-2014-1588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1589">CVE-2014-1589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1590">CVE-2014-1590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1591">CVE-2014-1591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1592">CVE-2014-1592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1593">CVE-2014-1593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1594">CVE-2014-1594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5369">CVE-2014-5369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8631">CVE-2014-8631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8632">CVE-2014-8632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8634">CVE-2014-8634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8635">CVE-2014-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8636">CVE-2014-8636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8637">CVE-2014-8637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8638">CVE-2014-8638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8639">CVE-2014-8639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8640">CVE-2014-8640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8641">CVE-2014-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8642">CVE-2014-8642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0817">CVE-2015-0817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0818">CVE-2015-0818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0819">CVE-2015-0819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0820">CVE-2015-0820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0821">CVE-2015-0821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0822">CVE-2015-0822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0823">CVE-2015-0823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0824">CVE-2015-0824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0825">CVE-2015-0825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0826">CVE-2015-0826</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0827">CVE-2015-0827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0828">CVE-2015-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0829">CVE-2015-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0830">CVE-2015-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0831">CVE-2015-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0832">CVE-2015-0832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0833">CVE-2015-0833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0834">CVE-2015-0834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0835">CVE-2015-0835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0836">CVE-2015-0836</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 03:07:39 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T03:07:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Apr 2015 20:01:24 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-04-08T20:01:24Z">ackle</metadata>
</glsa>
-
diff --git a/glsa-201504-02.xml b/glsa-201504-02.xml
index efce2169..32fdd4a4 100644
--- a/glsa-201504-02.xml
+++ b/glsa-201504-02.xml
@@ -6,8 +6,8 @@
arbitrary files or bypass security restrictions.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>539532</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9680">CVE-2014-9680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9680">CVE-2014-9680</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Mar 2015 16:50:29 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 14:50:58 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-29T16:50:29Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-11T14:50:58Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201504-03.xml b/glsa-201504-03.xml
index 9024130b..b70cb217 100644
--- a/glsa-201504-03.xml
+++ b/glsa-201504-03.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">apache</product>
- <announced>April 11, 2015</announced>
- <revised>April 19, 2015: 2</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-19: 2</revised>
<bug>535948</bug>
<access>remote</access>
<affected>
@@ -44,15 +44,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5704">CVE-2013-5704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0118">CVE-2014-0118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0231">CVE-2014-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5704">CVE-2013-5704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0118">CVE-2014-0118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0231">CVE-2014-0231</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 02:07:45 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T02:07:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Apr 2015 00:06:25 +0000">
+ <metadata tag="submitter" timestamp="2015-04-19T00:06:25Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201504-04.xml b/glsa-201504-04.xml
index 6439afb7..8b416163 100644
--- a/glsa-201504-04.xml
+++ b/glsa-201504-04.xml
@@ -6,8 +6,8 @@
can allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">xen</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>478280</bug>
<bug>482138</bug>
<bug>512294</bug>
@@ -59,31 +59,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2212">CVE-2013-2212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3495">CVE-2013-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3967">CVE-2014-3967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3968">CVE-2014-3968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146">CVE-2014-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149">CVE-2014-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594">CVE-2014-8594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595">CVE-2014-8595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8866">CVE-2014-8866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8867">CVE-2014-8867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030">CVE-2014-9030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9065">CVE-2014-9065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9066">CVE-2014-9066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0361">CVE-2015-0361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2044">CVE-2015-2044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2045">CVE-2015-2045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2152">CVE-2015-2152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2751">CVE-2015-2751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2752">CVE-2015-2752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2756">CVE-2015-2756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2212">CVE-2013-2212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3495">CVE-2013-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3967">CVE-2014-3967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3968">CVE-2014-3968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146">CVE-2014-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149">CVE-2014-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594">CVE-2014-8594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595">CVE-2014-8595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8866">CVE-2014-8866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8867">CVE-2014-8867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030">CVE-2014-9030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9065">CVE-2014-9065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9066">CVE-2014-9066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0361">CVE-2015-0361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2044">CVE-2015-2044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2045">CVE-2015-2045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2152">CVE-2015-2152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2751">CVE-2015-2751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2752">CVE-2015-2752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2756">CVE-2015-2756</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Feb 2015 02:14:06 +0000">
+ <metadata tag="requester" timestamp="2015-02-01T02:14:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 20:08:49 +0000">
+ <metadata tag="submitter" timestamp="2015-04-11T20:08:49Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201504-05.xml b/glsa-201504-05.xml
index 538c65d0..de1d07ec 100644
--- a/glsa-201504-05.xml
+++ b/glsa-201504-05.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">mysql mariadb</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>537216</bug>
<bug>537262</bug>
<access>remote</access>
@@ -58,20 +58,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6568">CVE-2014-6568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0374">CVE-2015-0374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0381">CVE-2015-0381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0382">CVE-2015-0382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0385">CVE-2015-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0391">CVE-2015-0391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0409">CVE-2015-0409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0411">CVE-2015-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0432">CVE-2015-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6568">CVE-2014-6568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0374">CVE-2015-0374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0381">CVE-2015-0381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0382">CVE-2015-0382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0385">CVE-2015-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0391">CVE-2015-0391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0409">CVE-2015-0409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0411">CVE-2015-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0432">CVE-2015-0432</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Feb 2015 14:04:19 +0000">
+ <metadata tag="requester" timestamp="2015-02-16T14:04:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 20:11:58 +0000">
+ <metadata tag="submitter" timestamp="2015-04-11T20:11:58Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201504-06.xml b/glsa-201504-06.xml
index 60dfb6e1..7c568191 100644
--- a/glsa-201504-06.xml
+++ b/glsa-201504-06.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>April 17, 2015</announced>
- <revised>April 17, 2015: 2</revised>
+ <announced>2015-04-17</announced>
+ <revised>2015-04-17: 2</revised>
<bug>532086</bug>
<bug>539692</bug>
<access>remote</access>
@@ -46,23 +46,23 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8091">CVE-2014-8091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8092">CVE-2014-8092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8093">CVE-2014-8093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8094">CVE-2014-8094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8095">CVE-2014-8095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8096">CVE-2014-8096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8097">CVE-2014-8097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8098">CVE-2014-8098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8099">CVE-2014-8099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8100">CVE-2014-8100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8101">CVE-2014-8101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8102">CVE-2014-8102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8103">CVE-2014-8103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0255">CVE-2015-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8091">CVE-2014-8091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8092">CVE-2014-8092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8093">CVE-2014-8093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8094">CVE-2014-8094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8095">CVE-2014-8095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8096">CVE-2014-8096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8097">CVE-2014-8097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8098">CVE-2014-8098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8099">CVE-2014-8099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8100">CVE-2014-8100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8101">CVE-2014-8101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8102">CVE-2014-8102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8103">CVE-2014-8103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0255">CVE-2015-0255</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Jan 2015 19:25:14 +0000">
+ <metadata tag="requester" timestamp="2015-01-31T19:25:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Apr 2015 12:55:13 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-17T12:55:13Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201504-07.xml b/glsa-201504-07.xml
index ae46af1c..1c6d4427 100644
--- a/glsa-201504-07.xml
+++ b/glsa-201504-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>April 17, 2015</announced>
- <revised>April 17, 2015: 1</revised>
+ <announced>2015-04-17</announced>
+ <revised>2015-04-17: 1</revised>
<bug>546706</bug>
<access>remote</access>
<affected>
@@ -45,29 +45,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0346">CVE-2015-0346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0347">CVE-2015-0347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0348">CVE-2015-0348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0349">CVE-2015-0349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0350">CVE-2015-0350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0351">CVE-2015-0351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0352">CVE-2015-0352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0353">CVE-2015-0353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0354">CVE-2015-0354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0355">CVE-2015-0355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0356">CVE-2015-0356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0357">CVE-2015-0357</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0358">CVE-2015-0358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0359">CVE-2015-0359</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0360">CVE-2015-0360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3038">CVE-2015-3038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3039">CVE-2015-3039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3040">CVE-2015-3040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3041">CVE-2015-3041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3042">CVE-2015-3042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3043">CVE-2015-3043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0346">CVE-2015-0346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0347">CVE-2015-0347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0348">CVE-2015-0348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0349">CVE-2015-0349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0350">CVE-2015-0350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0351">CVE-2015-0351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0352">CVE-2015-0352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0353">CVE-2015-0353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0354">CVE-2015-0354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0355">CVE-2015-0355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0356">CVE-2015-0356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0357">CVE-2015-0357</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0358">CVE-2015-0358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0359">CVE-2015-0359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0360">CVE-2015-0360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3038">CVE-2015-3038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3039">CVE-2015-3039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3040">CVE-2015-3040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3041">CVE-2015-3041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3042">CVE-2015-3042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3043">CVE-2015-3043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Apr 2015 12:25:20 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Apr 2015 15:29:39 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-04-17T12:25:20Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-17T15:29:39Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201505-01.xml b/glsa-201505-01.xml
index 39ca9731..63198bec 100644
--- a/glsa-201505-01.xml
+++ b/glsa-201505-01.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>May 13, 2015</announced>
- <revised>May 13, 2015: 1</revised>
+ <announced>2015-05-13</announced>
+ <revised>2015-05-13: 1</revised>
<bug>532764</bug>
<access>remote</access>
<affected>
@@ -42,17 +42,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6395">CVE-2014-6395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6396">CVE-2014-6396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9376">CVE-2014-9376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9377">CVE-2014-9377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9378">CVE-2014-9378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9379">CVE-2014-9379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9380">CVE-2014-9380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9381">CVE-2014-9381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6395">CVE-2014-6395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6396">CVE-2014-6396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9376">CVE-2014-9376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9377">CVE-2014-9377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9378">CVE-2014-9378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9379">CVE-2014-9379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9380">CVE-2014-9380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9381">CVE-2014-9381</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Apr 2015 04:38:40 +0000">
+ <metadata tag="requester" timestamp="2015-04-06T04:38:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 May 2015 09:24:38 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-05-13T09:24:38Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201505-02.xml b/glsa-201505-02.xml
index 7e1d698a..f70cdee0 100644
--- a/glsa-201505-02.xml
+++ b/glsa-201505-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>May 31, 2015</announced>
- <revised>May 31, 2015: 1</revised>
+ <announced>2015-05-31</announced>
+ <revised>2015-05-31: 1</revised>
<bug>549388</bug>
<access>remote</access>
<affected>
@@ -46,25 +46,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077">CVE-2015-3077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078">CVE-2015-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079">CVE-2015-3079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080">CVE-2015-3080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081">CVE-2015-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082">CVE-2015-3082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083">CVE-2015-3083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084">CVE-2015-3084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085">CVE-2015-3085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086">CVE-2015-3086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087">CVE-2015-3087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088">CVE-2015-3088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089">CVE-2015-3089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090">CVE-2015-3090</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091">CVE-2015-3091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092">CVE-2015-3092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093">CVE-2015-3093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077">CVE-2015-3077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078">CVE-2015-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079">CVE-2015-3079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080">CVE-2015-3080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081">CVE-2015-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082">CVE-2015-3082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083">CVE-2015-3083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084">CVE-2015-3084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085">CVE-2015-3085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086">CVE-2015-3086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087">CVE-2015-3087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088">CVE-2015-3088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089">CVE-2015-3089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090">CVE-2015-3090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091">CVE-2015-3091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092">CVE-2015-3092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093">CVE-2015-3093</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 May 2015 08:52:43 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 May 2015 19:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-14T08:52:43Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-05-31T19:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201505-03.xml b/glsa-201505-03.xml
index e06a9e46..50b406c2 100644
--- a/glsa-201505-03.xml
+++ b/glsa-201505-03.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>May 31, 2015</announced>
- <revised>May 14, 2016: 2</revised>
+ <announced>2015-05-31</announced>
+ <revised>2016-05-14: 2</revised>
<bug>517858</bug>
<bug>522844</bug>
<bug>530054</bug>
@@ -65,16 +65,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4986">CVE-2014-4986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4987">CVE-2014-4987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6300">CVE-2014-6300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8958">CVE-2014-8958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8959">CVE-2014-8959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8960">CVE-2014-8960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8961">CVE-2014-8961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4986">CVE-2014-4986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4987">CVE-2014-4987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6300">CVE-2014-6300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8958">CVE-2014-8958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8959">CVE-2014-8959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8960">CVE-2014-8960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8961">CVE-2014-8961</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Mar 2015 15:47:49 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 May 2016 20:55:11 +0000">
+ <metadata tag="requester" timestamp="2015-03-14T15:47:49Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-05-14T20:55:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201506-01.xml b/glsa-201506-01.xml
index ed466e88..5b2fbfd5 100644
--- a/glsa-201506-01.xml
+++ b/glsa-201506-01.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 21, 2015</announced>
- <revised>June 21, 2015: 1</revised>
+ <product type="ebuild"/>
+ <announced>2015-06-21</announced>
+ <revised>2015-06-21: 1</revised>
<bug>551658</bug>
<access>remote</access>
<affected>
@@ -46,23 +46,23 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096">CVE-2015-3096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097">CVE-2015-3097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098">CVE-2015-3098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099">CVE-2015-3099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100">CVE-2015-3100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101">CVE-2015-3101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102">CVE-2015-3102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103">CVE-2015-3103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104">CVE-2015-3104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105">CVE-2015-3105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106">CVE-2015-3106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108">CVE-2015-3108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472">CVE-2015-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096">CVE-2015-3096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097">CVE-2015-3097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098">CVE-2015-3098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099">CVE-2015-3099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100">CVE-2015-3100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101">CVE-2015-3101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102">CVE-2015-3102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103">CVE-2015-3103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104">CVE-2015-3104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105">CVE-2015-3105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106">CVE-2015-3106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108">CVE-2015-3108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472">CVE-2015-4472</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Apr 2015 05:51:26 +0000">
+ <metadata tag="requester" timestamp="2015-04-17T05:51:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2015 17:17:03 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-21T17:17:03Z">K_F</metadata>
</glsa>
diff --git a/glsa-201506-02.xml b/glsa-201506-02.xml
index a3cd389e..9dc01f82 100644
--- a/glsa-201506-02.xml
+++ b/glsa-201506-02.xml
@@ -6,8 +6,8 @@
in either Denial of Service or information disclosure.
</synopsis>
<product type="ebuild">dos</product>
- <announced>June 22, 2015</announced>
- <revised>February 26, 2016: 2</revised>
+ <announced>2015-06-22</announced>
+ <revised>2016-02-26: 2</revised>
<bug>551832</bug>
<access>remote</access>
<affected>
@@ -61,14 +61,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176">CVE-2014-8176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788">CVE-2015-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789">CVE-2015-1789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790">CVE-2015-1790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791">CVE-2015-1791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792">CVE-2015-1792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176">CVE-2014-8176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788">CVE-2015-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789">CVE-2015-1789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790">CVE-2015-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791">CVE-2015-1791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792">CVE-2015-1792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 18:19:42 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 14:45:26 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-06-21T18:19:42Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-02-26T14:45:26Z">K_F</metadata>
</glsa>
diff --git a/glsa-201506-03.xml b/glsa-201506-03.xml
index 2419378b..eb65beca 100644
--- a/glsa-201506-03.xml
+++ b/glsa-201506-03.xml
@@ -6,8 +6,8 @@
which can cause Denial of Service
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>June 22, 2015</announced>
- <revised>June 22, 2015: 1</revised>
+ <announced>2015-06-22</announced>
+ <revised>2015-06-22: 1</revised>
<bug>546760</bug>
<bug>548636</bug>
<access>local, remote</access>
@@ -41,13 +41,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308">CVE-2015-3308</uri>
- <uri link="http://www.gnutls.org/security.html#GNUTLS-SA-2015-2">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308">CVE-2015-3308</uri>
+ <uri link="https://www.gnutls.org/security.html#GNUTLS-SA-2015-2">
GNUTLS-SA-2015-2
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 03:15:45 +0000">
+ <metadata tag="requester" timestamp="2015-06-21T03:15:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Jun 2015 21:37:44 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-22T21:37:44Z">K_F</metadata>
</glsa>
diff --git a/glsa-201506-04.xml b/glsa-201506-04.xml
index 58beb410..3276535c 100644
--- a/glsa-201506-04.xml
+++ b/glsa-201506-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been fixed in Chromium, the worst of
which can cause arbitrary remote code execution.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 23, 2015</announced>
- <revised>June 23, 2015: 1</revised>
+ <product type="ebuild"/>
+ <announced>2015-06-23</announced>
+ <revised>2015-06-23: 1</revised>
<bug>545300</bug>
<bug>546728</bug>
<bug>548108</bug>
@@ -46,39 +46,39 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233">CVE-2015-1233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234">CVE-2015-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235">CVE-2015-1235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236">CVE-2015-1236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237">CVE-2015-1237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238">CVE-2015-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240">CVE-2015-1240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241">CVE-2015-1241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242">CVE-2015-1242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243">CVE-2015-1243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244">CVE-2015-1244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245">CVE-2015-1245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246">CVE-2015-1246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247">CVE-2015-1247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248">CVE-2015-1248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250">CVE-2015-1250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251">CVE-2015-1251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252">CVE-2015-1252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253">CVE-2015-1253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254">CVE-2015-1254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255">CVE-2015-1255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256">CVE-2015-1256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257">CVE-2015-1257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258">CVE-2015-1258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259">CVE-2015-1259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260">CVE-2015-1260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262">CVE-2015-1262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263">CVE-2015-1263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264">CVE-2015-1264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265">CVE-2015-1265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233">CVE-2015-1233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234">CVE-2015-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235">CVE-2015-1235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236">CVE-2015-1236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237">CVE-2015-1237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238">CVE-2015-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240">CVE-2015-1240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241">CVE-2015-1241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242">CVE-2015-1242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243">CVE-2015-1243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244">CVE-2015-1244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245">CVE-2015-1245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246">CVE-2015-1246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247">CVE-2015-1247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248">CVE-2015-1248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250">CVE-2015-1250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251">CVE-2015-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252">CVE-2015-1252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253">CVE-2015-1253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254">CVE-2015-1254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255">CVE-2015-1255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256">CVE-2015-1256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257">CVE-2015-1257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258">CVE-2015-1258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259">CVE-2015-1259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260">CVE-2015-1260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262">CVE-2015-1262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263">CVE-2015-1263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264">CVE-2015-1264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265">CVE-2015-1265</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Apr 2015 23:20:39 +0000">
+ <metadata tag="requester" timestamp="2015-04-10T23:20:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Jun 2015 03:28:25 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-23T03:28:25Z">K_F</metadata>
</glsa>
diff --git a/glsa-201507-01.xml b/glsa-201507-01.xml
index 2b6996a5..bf53393b 100644
--- a/glsa-201507-01.xml
+++ b/glsa-201507-01.xml
@@ -6,8 +6,8 @@
which can cause arbitrary code execution.
</synopsis>
<product type="ebuild">chrony</product>
- <announced>July 05, 2015</announced>
- <revised>July 05, 2015: 1</revised>
+ <announced>2015-07-05</announced>
+ <revised>2015-07-05: 1</revised>
<bug>545918</bug>
<access>remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1821">CVE-2015-1821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1822">CVE-2015-1822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1853">CVE-2015-1853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1821">CVE-2015-1821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1822">CVE-2015-1822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1853">CVE-2015-1853</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 May 2015 23:36:26 +0000">
+ <metadata tag="requester" timestamp="2015-05-13T23:36:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jul 2015 16:16:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-05T16:16:15Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-02.xml b/glsa-201507-02.xml
index 1c042d71..d14ca08e 100644
--- a/glsa-201507-02.xml
+++ b/glsa-201507-02.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tor</product>
- <announced>July 06, 2015</announced>
- <revised>July 06, 2015: 1</revised>
+ <announced>2015-07-06</announced>
+ <revised>2015-07-06: 1</revised>
<bug>545940</bug>
<access>remote</access>
<affected>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2928">CVE-2015-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2929">CVE-2015-2929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2928">CVE-2015-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2929">CVE-2015-2929</uri>
<uri link="https://blog.torproject.org/blog/tor-02512-and-0267-are-released">
Upstream announcement
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:21:11 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:21:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jul 2015 19:00:59 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2015-07-06T19:00:59Z">stanley</metadata>
</glsa>
diff --git a/glsa-201507-03.xml b/glsa-201507-03.xml
index 1787063c..3311d81b 100644
--- a/glsa-201507-03.xml
+++ b/glsa-201507-03.xml
@@ -4,8 +4,8 @@
<title>Exiv2: Denial of Service</title>
<synopsis>A vulnerability in Exiv2 could lead to Denial of Service condition.</synopsis>
<product type="ebuild">exiv2</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>534608</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9449">CVE-2014-9449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9449">CVE-2014-9449</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:51:42 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:51:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:47:36 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:47:36Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-04.xml b/glsa-201507-04.xml
index e0ad92a4..959c18c2 100644
--- a/glsa-201507-04.xml
+++ b/glsa-201507-04.xml
@@ -7,8 +7,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">icu</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546156</bug>
<access>remote</access>
<affected>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8146">CVE-2014-8146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8147">CVE-2014-8147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8146">CVE-2014-8146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8147">CVE-2014-8147</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 20:31:45 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T20:31:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:54:03 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:54:03Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-05.xml b/glsa-201507-05.xml
index 5aceef16..169f1425 100644
--- a/glsa-201507-05.xml
+++ b/glsa-201507-05.xml
@@ -6,8 +6,8 @@
context-dependent attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">sqlite</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546626</bug>
<access>local, remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3414">CVE-2015-3414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3415">CVE-2015-3415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3416">CVE-2015-3416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3414">CVE-2015-3414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3415">CVE-2015-3415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3416">CVE-2015-3416</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 22:11:40 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T22:11:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:59:20 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:59:20Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-06.xml b/glsa-201507-06.xml
index 10b90d0d..f71f630a 100644
--- a/glsa-201507-06.xml
+++ b/glsa-201507-06.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">unrtf</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>531544</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9274">CVE-2014-9274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9275">CVE-2014-9275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9274">CVE-2014-9274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9275">CVE-2014-9275</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:55:17 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:55:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:06:22 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:06:22Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-07.xml b/glsa-201507-07.xml
index 8ba1c2d6..24ea3251 100644
--- a/glsa-201507-07.xml
+++ b/glsa-201507-07.xml
@@ -6,8 +6,8 @@
of which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libvncserver</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>523590</bug>
<access>remote</access>
<affected>
@@ -44,14 +44,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6052">CVE-2014-6052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6053">CVE-2014-6053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6054">CVE-2014-6054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6055">CVE-2014-6055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6052">CVE-2014-6052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6053">CVE-2014-6053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6054">CVE-2014-6054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6055">CVE-2014-6055</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Jun 2015 14:26:10 +0000">
+ <metadata tag="requester" timestamp="2015-06-06T14:26:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:11:47 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:11:47Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-08.xml b/glsa-201507-08.xml
index d3e3d764..c1f7da27 100644
--- a/glsa-201507-08.xml
+++ b/glsa-201507-08.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546720</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:35:37 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:35:37Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:19:17 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:19:17Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-09.xml b/glsa-201507-09.xml
index 87c7cb79..034d7591 100644
--- a/glsa-201507-09.xml
+++ b/glsa-201507-09.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">pypam</product>
- <announced>July 09, 2015</announced>
- <revised>July 09, 2015: 1</revised>
+ <announced>2015-07-09</announced>
+ <revised>2015-07-09: 1</revised>
<bug>407603</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1502">CVE-2012-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1502">CVE-2012-1502</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 03:25:05 +0000">
+ <metadata tag="requester" timestamp="2015-06-21T03:25:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2015 18:51:16 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-09T18:51:16Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-10.xml b/glsa-201507-10.xml
index e34eaac0..3d52c555 100644
--- a/glsa-201507-10.xml
+++ b/glsa-201507-10.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">t1utils</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>548638</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3905">CVE-2015-3905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3905">CVE-2015-3905</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jul 2015 04:39:33 +0000">
+ <metadata tag="requester" timestamp="2015-07-06T04:39:33Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 08:01:40 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T08:01:40Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201507-11.xml b/glsa-201507-11.xml
index 5ccf39c5..38af314c 100644
--- a/glsa-201507-11.xml
+++ b/glsa-201507-11.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">perl</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>216671</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7422">CVE-2013-7422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7422">CVE-2013-7422</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Mar 2015 15:10:08 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 08:19:35 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-29T15:10:08Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T08:19:35Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-12.xml b/glsa-201507-12.xml
index 957562bc..ed8f63e8 100644
--- a/glsa-201507-12.xml
+++ b/glsa-201507-12.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libcapsinetwork</product>
- <announced>July 10, 2015</announced>
- <revised>July 11, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-11: 2</revised>
<bug>544324</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0841">CVE-2015-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0841">CVE-2015-0841</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 May 2015 09:38:01 +0000">
+ <metadata tag="requester" timestamp="2015-05-29T09:38:01Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2015 09:32:23 +0000">
+ <metadata tag="submitter" timestamp="2015-07-11T09:32:23Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201507-13.xml b/glsa-201507-13.xml
index 0a38ae2b..24d9bff6 100644
--- a/glsa-201507-13.xml
+++ b/glsa-201507-13.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ACE,DoS,flash</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>552946</bug>
<bug>554220</bug>
<bug>554250</bug>
@@ -48,43 +48,43 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578">CVE-2014-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113">CVE-2015-3113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114">CVE-2015-3114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115">CVE-2015-3115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116">CVE-2015-3116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117">CVE-2015-3117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118">CVE-2015-3118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119">CVE-2015-3119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120">CVE-2015-3120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121">CVE-2015-3121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122">CVE-2015-3122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123">CVE-2015-3123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124">CVE-2015-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125">CVE-2015-3125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126">CVE-2015-3126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127">CVE-2015-3127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128">CVE-2015-3128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129">CVE-2015-3129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130">CVE-2015-3130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131">CVE-2015-3131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132">CVE-2015-3132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133">CVE-2015-3133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134">CVE-2015-3134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135">CVE-2015-3135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136">CVE-2015-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137">CVE-2015-3137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428">CVE-2015-4428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429">CVE-2015-4429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430">CVE-2015-4430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431">CVE-2015-4431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432">CVE-2015-4432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433">CVE-2015-4433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116">CVE-2015-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117">CVE-2015-5117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118">CVE-2015-5118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119">CVE-2015-5119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578">CVE-2014-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113">CVE-2015-3113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114">CVE-2015-3114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115">CVE-2015-3115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116">CVE-2015-3116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117">CVE-2015-3117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118">CVE-2015-3118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119">CVE-2015-3119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120">CVE-2015-3120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121">CVE-2015-3121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122">CVE-2015-3122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123">CVE-2015-3123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124">CVE-2015-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125">CVE-2015-3125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126">CVE-2015-3126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127">CVE-2015-3127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128">CVE-2015-3128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129">CVE-2015-3129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130">CVE-2015-3130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131">CVE-2015-3131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132">CVE-2015-3132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133">CVE-2015-3133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134">CVE-2015-3134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135">CVE-2015-3135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136">CVE-2015-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137">CVE-2015-3137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428">CVE-2015-4428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429">CVE-2015-4429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430">CVE-2015-4430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431">CVE-2015-4431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432">CVE-2015-4432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433">CVE-2015-4433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116">CVE-2015-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117">CVE-2015-5117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118">CVE-2015-5118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119">CVE-2015-5119</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2015 08:30:25 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 12:49:29 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-07-10T08:30:25Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T12:49:29Z">K_F</metadata>
</glsa>
diff --git a/glsa-201507-14.xml b/glsa-201507-14.xml
index 042ead72..a81c3ef1 100644
--- a/glsa-201507-14.xml
+++ b/glsa-201507-14.xml
@@ -7,8 +7,8 @@
components.
</synopsis>
<product type="ebuild">oracle-jre oracle-jdk</product>
- <announced>July 10, 2015</announced>
- <revised>July 11, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-11: 2</revised>
<bug>537214</bug>
<access>local, remote</access>
<affected>
@@ -74,27 +74,27 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6549">CVE-2014-6549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0403">CVE-2015-0403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0406">CVE-2015-0406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0410">CVE-2015-0410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0413">CVE-2015-0413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0421">CVE-2015-0421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6549">CVE-2014-6549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0403">CVE-2015-0403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0406">CVE-2015-0406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0410">CVE-2015-0410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0413">CVE-2015-0413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0421">CVE-2015-0421</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Jul 2015 22:00:28 +0000">
+ <metadata tag="requester" timestamp="2015-07-02T22:00:28Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2015 09:43:01 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2015-07-11T09:43:01Z">stanley</metadata>
</glsa>
diff --git a/glsa-201507-15.xml b/glsa-201507-15.xml
index b7d24b08..4b90e125 100644
--- a/glsa-201507-15.xml
+++ b/glsa-201507-15.xml
@@ -4,8 +4,8 @@
<title>OpenSSL: Alternate chains certificate forgery</title>
<synopsis>Certain checks on untrusted certificates can be bypassed.</synopsis>
<product type="ebuild">openssl</product>
- <announced>July 10, 2015</announced>
- <revised>February 26, 2016: 3</revised>
+ <announced>2015-07-10</announced>
+ <revised>2016-02-26: 3</revised>
<bug>554172</bug>
<access>remote</access>
<affected>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1793">CVE-2015-1793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1793">CVE-2015-1793</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Jul 2015 09:20:30 +0000">
+ <metadata tag="requester" timestamp="2015-07-08T09:20:30Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 14:46:50 +0000">
+ <metadata tag="submitter" timestamp="2016-02-26T14:46:50Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201507-16.xml b/glsa-201507-16.xml
index 6949d4bd..47f3f2e9 100644
--- a/glsa-201507-16.xml
+++ b/glsa-201507-16.xml
@@ -6,8 +6,8 @@
attacker to conduct a man-in-the-middle attack.
</synopsis>
<product type="ebuild">portage</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 2</revised>
<bug>469888</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2100">CVE-2013-2100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2100">CVE-2013-2100</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:42:59 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:59:39 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:42:59Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:59:39Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-17.xml b/glsa-201507-17.xml
index ba483304..d03dba74 100644
--- a/glsa-201507-17.xml
+++ b/glsa-201507-17.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 2</revised>
<bug>522062</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3565">CVE-2014-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3565">CVE-2014-3565</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:23:12 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 14:05:46 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:23:12Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T14:05:46Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-18.xml b/glsa-201507-18.xml
index 857e5eb5..09491912 100644
--- a/glsa-201507-18.xml
+++ b/glsa-201507-18.xml
@@ -6,8 +6,8 @@
remote attackers to bypass security restrictions.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>552904</bug>
<access>remote</access>
<affected>
@@ -41,11 +41,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1266">CVE-2015-1266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1267">CVE-2015-1267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1268">CVE-2015-1268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1269">CVE-2015-1269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1266">CVE-2015-1266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1267">CVE-2015-1267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1268">CVE-2015-1268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1269">CVE-2015-1269</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2015 08:59:44 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:19:46 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-06-24T08:59:44Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:19:46Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-19.xml b/glsa-201507-19.xml
index 7a52329e..97018a35 100644
--- a/glsa-201507-19.xml
+++ b/glsa-201507-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>546722</bug>
<access>remote</access>
<affected>
@@ -51,30 +51,30 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0405">CVE-2015-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0423">CVE-2015-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0433">CVE-2015-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0438">CVE-2015-0438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0439">CVE-2015-0439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0441">CVE-2015-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0498">CVE-2015-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0499">CVE-2015-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0500">CVE-2015-0500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0501">CVE-2015-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0503">CVE-2015-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0505">CVE-2015-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0506">CVE-2015-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0507">CVE-2015-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0508">CVE-2015-0508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0511">CVE-2015-0511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2566">CVE-2015-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2567">CVE-2015-2567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2568">CVE-2015-2568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2571">CVE-2015-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2573">CVE-2015-2573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0405">CVE-2015-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0423">CVE-2015-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0433">CVE-2015-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0438">CVE-2015-0438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0439">CVE-2015-0439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0441">CVE-2015-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0498">CVE-2015-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0499">CVE-2015-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0500">CVE-2015-0500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0501">CVE-2015-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0503">CVE-2015-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0505">CVE-2015-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0506">CVE-2015-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0507">CVE-2015-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0508">CVE-2015-0508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0511">CVE-2015-0511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2566">CVE-2015-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2567">CVE-2015-2567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2568">CVE-2015-2568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2571">CVE-2015-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2573">CVE-2015-2573</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 19:02:02 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T19:02:02Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:23:50 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:23:50Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-20.xml b/glsa-201507-20.xml
index 602e69c8..5a488a8d 100644
--- a/glsa-201507-20.xml
+++ b/glsa-201507-20.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>July 18, 2015</announced>
- <revised>January 03, 2017: 3</revised>
+ <announced>2015-07-18</announced>
+ <revised>2017-01-03: 3</revised>
<bug>539018</bug>
<bug>550172</bug>
<access>remote</access>
@@ -93,17 +93,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8161">CVE-2014-8161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0241">CVE-2015-0241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0242">CVE-2015-0242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0243">CVE-2015-0243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0244">CVE-2015-0244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3165">CVE-2015-3165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3166">CVE-2015-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3167">CVE-2015-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8161">CVE-2014-8161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0241">CVE-2015-0241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0242">CVE-2015-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0243">CVE-2015-0243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0244">CVE-2015-0244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3165">CVE-2015-3165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3166">CVE-2015-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3167">CVE-2015-3167</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:30:11 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:30:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:30:36 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:30:36Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-21.xml b/glsa-201507-21.xml
index e3e2d10d..523aabd7 100644
--- a/glsa-201507-21.xml
+++ b/glsa-201507-21.xml
@@ -6,8 +6,8 @@
which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libXfont</product>
- <announced>July 22, 2015</announced>
- <revised>July 22, 2015: 1</revised>
+ <announced>2015-07-22</announced>
+ <revised>2015-07-22: 1</revised>
<bug>543620</bug>
<access>remote</access>
<affected>
@@ -50,12 +50,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1802">CVE-2015-1802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1803">CVE-2015-1803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1804">CVE-2015-1804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1802">CVE-2015-1802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1803">CVE-2015-1803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1804">CVE-2015-1804</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2015 15:23:52 +0000">
+ <metadata tag="requester" timestamp="2015-04-04T15:23:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jul 2015 15:44:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-22T15:44:59Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201507-22.xml b/glsa-201507-22.xml
index 3537adbc..a95d6f4e 100644
--- a/glsa-201507-22.xml
+++ b/glsa-201507-22.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>July 23, 2015</announced>
- <revised>July 23, 2015: 1</revised>
+ <announced>2015-07-23</announced>
+ <revised>2015-07-23: 1</revised>
<bug>540536</bug>
<access>local</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1572">CVE-2015-1572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1572">CVE-2015-1572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Jul 2015 11:07:25 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 23 Jul 2015 15:35:12 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-07-17T11:07:25Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-23T15:35:12Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201508-01.xml b/glsa-201508-01.xml
index 98196605..767c4cd7 100644
--- a/glsa-201508-01.xml
+++ b/glsa-201508-01.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE,DoS</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>554882</bug>
<bug>557342</bug>
<access>remote</access>
@@ -46,48 +46,48 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122">CVE-2015-5122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123">CVE-2015-5123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124">CVE-2015-5124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125">CVE-2015-5125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127">CVE-2015-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129">CVE-2015-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130">CVE-2015-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131">CVE-2015-5131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132">CVE-2015-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133">CVE-2015-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134">CVE-2015-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539">CVE-2015-5539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540">CVE-2015-5540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541">CVE-2015-5541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544">CVE-2015-5544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545">CVE-2015-5545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546">CVE-2015-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547">CVE-2015-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548">CVE-2015-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549">CVE-2015-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550">CVE-2015-5550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551">CVE-2015-5551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552">CVE-2015-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553">CVE-2015-5553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554">CVE-2015-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555">CVE-2015-5555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556">CVE-2015-5556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557">CVE-2015-5557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558">CVE-2015-5558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559">CVE-2015-5559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560">CVE-2015-5560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561">CVE-2015-5561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562">CVE-2015-5562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563">CVE-2015-5563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564">CVE-2015-5564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965">CVE-2015-5965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122">CVE-2015-5122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123">CVE-2015-5123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124">CVE-2015-5124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125">CVE-2015-5125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127">CVE-2015-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129">CVE-2015-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130">CVE-2015-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131">CVE-2015-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132">CVE-2015-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133">CVE-2015-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134">CVE-2015-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539">CVE-2015-5539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540">CVE-2015-5540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541">CVE-2015-5541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544">CVE-2015-5544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545">CVE-2015-5545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546">CVE-2015-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547">CVE-2015-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548">CVE-2015-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549">CVE-2015-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550">CVE-2015-5550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551">CVE-2015-5551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552">CVE-2015-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553">CVE-2015-5553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554">CVE-2015-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555">CVE-2015-5555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556">CVE-2015-5556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557">CVE-2015-5557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558">CVE-2015-5558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559">CVE-2015-5559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560">CVE-2015-5560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561">CVE-2015-5561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562">CVE-2015-5562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563">CVE-2015-5563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564">CVE-2015-5564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965">CVE-2015-5965</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jul 2015 02:44:26 +0000">
+ <metadata tag="requester" timestamp="2015-07-21T02:44:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 04:47:52 +0000">
+ <metadata tag="submitter" timestamp="2015-08-15T04:47:52Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201508-02.xml b/glsa-201508-02.xml
index a467ae4c..f0a5cb1d 100644
--- a/glsa-201508-02.xml
+++ b/glsa-201508-02.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">libgadu</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>490238</bug>
<bug>505558</bug>
<bug>510714</bug>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4488">CVE-2013-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3775">CVE-2014-3775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4488">CVE-2013-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3775">CVE-2014-3775</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2014 04:01:34 +0000">
+ <metadata tag="requester" timestamp="2014-09-22T04:01:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 12:51:37 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-08-15T12:51:37Z">ackle</metadata>
</glsa>
diff --git a/glsa-201508-03.xml b/glsa-201508-03.xml
index 30e3a1b0..2f84388d 100644
--- a/glsa-201508-03.xml
+++ b/glsa-201508-03.xml
@@ -6,8 +6,8 @@
causes a Denial of Service condition.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>545968</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3026">CVE-2015-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3026">CVE-2015-3026</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:10:32 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 13:08:56 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:10:32Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-08-15T13:08:56Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-01.xml b/glsa-201509-01.xml
index bcab847f..ad9a58d9 100644
--- a/glsa-201509-01.xml
+++ b/glsa-201509-01.xml
@@ -6,8 +6,8 @@
could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>545836</bug>
<bug>553682</bug>
<access>remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1798">CVE-2015-1798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1799">CVE-2015-1799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5146">CVE-2015-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1798">CVE-2015-1798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1799">CVE-2015-1799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5146">CVE-2015-5146</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Aug 2015 06:31:39 +0000">
+ <metadata tag="requester" timestamp="2015-08-05T06:31:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:30:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:30:37Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-02.xml b/glsa-201509-02.xml
index af3c3f8f..ca43baa0 100644
--- a/glsa-201509-02.xml
+++ b/glsa-201509-02.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service condition.
</synopsis>
<product type="ebuild">curl</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>547376</bug>
<bug>552618</bug>
<access>remote</access>
@@ -45,13 +45,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3143">CVE-2015-3143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3144">CVE-2015-3144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3145">CVE-2015-3145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3148">CVE-2015-3148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3236">CVE-2015-3236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3237">CVE-2015-3237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3143">CVE-2015-3143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3144">CVE-2015-3144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3145">CVE-2015-3145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3148">CVE-2015-3148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3236">CVE-2015-3236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3237">CVE-2015-3237</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 12:07:04 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:47:50 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-04-22T12:07:04Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:47:50Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-03.xml b/glsa-201509-03.xml
index a381f43a..3bd02c1a 100644
--- a/glsa-201509-03.xml
+++ b/glsa-201509-03.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>506356</bug>
<bug>515108</bug>
<bug>554758</bug>
@@ -44,18 +44,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2326">CVE-2014-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2327">CVE-2014-2327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2328">CVE-2014-2328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2708">CVE-2014-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2709">CVE-2014-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4002">CVE-2014-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5025">CVE-2014-5025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5026">CVE-2014-5026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2967">CVE-2015-2967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2326">CVE-2014-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2327">CVE-2014-2327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2328">CVE-2014-2328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2708">CVE-2014-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2709">CVE-2014-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4002">CVE-2014-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5025">CVE-2014-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5026">CVE-2014-5026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2967">CVE-2015-2967</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Jul 2015 14:56:55 +0000">
+ <metadata tag="requester" timestamp="2015-07-13T14:56:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:49:25 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:49:25Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-04.xml b/glsa-201509-04.xml
index c1fdfab3..037f5e02 100644
--- a/glsa-201509-04.xml
+++ b/glsa-201509-04.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>544922</bug>
<bug>548252</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2806">CVE-2015-2806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3622">CVE-2015-3622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2806">CVE-2015-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3622">CVE-2015-3622</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 20:52:49 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T20:52:49Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:57:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:57:37Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-05.xml b/glsa-201509-05.xml
index 0c1fcdc5..27e87aa7 100644
--- a/glsa-201509-05.xml
+++ b/glsa-201509-05.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition in IPv6 network stacks.
</synopsis>
<product type="ebuild">networkmanager</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>545980</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2924">CVE-2015-2924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2924">CVE-2015-2924</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 19:06:18 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T19:06:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:58:36 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:58:36Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-06.xml b/glsa-201509-06.xml
index 9c07e67d..680ff6ca 100644
--- a/glsa-201509-06.xml
+++ b/glsa-201509-06.xml
@@ -6,8 +6,8 @@
in a case-insensitive or case-normalizing filesystem.
</synopsis>
<product type="ebuild">git</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>532984</bug>
<access>remote</access>
<affected>
@@ -63,10 +63,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 01:59:41 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T01:59:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 17:01:53 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T17:01:53Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201509-07.xml b/glsa-201509-07.xml
index b2d3ff16..0a525915 100644
--- a/glsa-201509-07.xml
+++ b/glsa-201509-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ACE,DoS,flash</product>
- <announced>September 25, 2015</announced>
- <revised>September 25, 2015: 1</revised>
+ <announced>2015-09-25</announced>
+ <revised>2015-09-25: 1</revised>
<bug>561076</bug>
<access>remote</access>
<affected>
@@ -45,36 +45,36 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5567">CVE-2015-5567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5568">CVE-2015-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5570">CVE-2015-5570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5571">CVE-2015-5571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5572">CVE-2015-5572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5573">CVE-2015-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5574">CVE-2015-5574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5575">CVE-2015-5575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5576">CVE-2015-5576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5577">CVE-2015-5577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5578">CVE-2015-5578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5579">CVE-2015-5579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5580">CVE-2015-5580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5581">CVE-2015-5581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5582">CVE-2015-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5584">CVE-2015-5584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5587">CVE-2015-5587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5588">CVE-2015-5588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6676">CVE-2015-6676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6677">CVE-2015-6677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6678">CVE-2015-6678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6679">CVE-2015-6679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6680">CVE-2015-6680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6681">CVE-2015-6681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6682">CVE-2015-6682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5567">CVE-2015-5567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5568">CVE-2015-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5570">CVE-2015-5570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5571">CVE-2015-5571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5572">CVE-2015-5572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5573">CVE-2015-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5574">CVE-2015-5574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5575">CVE-2015-5575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5576">CVE-2015-5576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5577">CVE-2015-5577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5578">CVE-2015-5578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5579">CVE-2015-5579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5580">CVE-2015-5580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5581">CVE-2015-5581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5582">CVE-2015-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5584">CVE-2015-5584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5587">CVE-2015-5587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5588">CVE-2015-5588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6676">CVE-2015-6676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6677">CVE-2015-6677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6678">CVE-2015-6678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6679">CVE-2015-6679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6680">CVE-2015-6680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6681">CVE-2015-6681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6682">CVE-2015-6682</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Sep 2015 23:34:39 +0000">
+ <metadata tag="requester" timestamp="2015-09-23T23:34:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Sep 2015 07:25:37 +0000">
+ <metadata tag="submitter" timestamp="2015-09-25T07:25:37Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201510-01.xml b/glsa-201510-01.xml
index 2f65e1fe..f22c88f8 100644
--- a/glsa-201510-01.xml
+++ b/glsa-201510-01.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>October 18, 2015</announced>
- <revised>October 18, 2015: 1</revised>
+ <announced>2015-10-18</announced>
+ <revised>2015-10-18: 1</revised>
<bug>540640</bug>
<bug>553584</bug>
<bug>556150</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349">CVE-2015-1349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620">CVE-2015-4620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477">CVE-2015-5477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722">CVE-2015-5722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986">CVE-2015-5986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349">CVE-2015-1349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620">CVE-2015-4620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477">CVE-2015-5477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722">CVE-2015-5722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986">CVE-2015-5986</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Jul 2015 15:16:23 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Oct 2015 19:47:34 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-07-23T15:16:23Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-10-18T19:47:34Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201510-02.xml b/glsa-201510-02.xml
index 2741780c..673c0fdf 100644
--- a/glsa-201510-02.xml
+++ b/glsa-201510-02.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>551752</bug>
<bug>555680</bug>
<bug>556050</bug>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214">CVE-2015-3214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158">CVE-2015-5158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214">CVE-2015-3214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158">CVE-2015-5158</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 12:11:27 +0000">
+ <metadata tag="requester" timestamp="2015-07-16T12:11:27Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:00:35 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:00:35Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201510-03.xml b/glsa-201510-03.xml
index b9e960ff..bd2c2671 100644
--- a/glsa-201510-03.xml
+++ b/glsa-201510-03.xml
@@ -6,8 +6,8 @@
attackers to cause Denial of Service condition.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>536034</bug>
<bug>542206</bug>
<bug>548898</bug>
@@ -45,25 +45,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187">CVE-2015-2187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188">CVE-2015-2188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189">CVE-2015-2189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190">CVE-2015-2190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191">CVE-2015-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192">CVE-2015-2192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3182">CVE-2015-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3808">CVE-2015-3808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3809">CVE-2015-3809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3810">CVE-2015-3810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3811">CVE-2015-3811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3812">CVE-2015-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3813">CVE-2015-3813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3814">CVE-2015-3814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3815">CVE-2015-3815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3906">CVE-2015-3906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4651">CVE-2015-4651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4652">CVE-2015-4652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187">CVE-2015-2187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188">CVE-2015-2188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189">CVE-2015-2189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190">CVE-2015-2190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191">CVE-2015-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192">CVE-2015-2192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3182">CVE-2015-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3808">CVE-2015-3808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3809">CVE-2015-3809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3810">CVE-2015-3810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3811">CVE-2015-3811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3812">CVE-2015-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3813">CVE-2015-3813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3814">CVE-2015-3814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3815">CVE-2015-3815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3906">CVE-2015-3906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4651">CVE-2015-4651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4652">CVE-2015-4652</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 20:47:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:09:09 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T20:47:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:09:09Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201510-04.xml b/glsa-201510-04.xml
index 71feec69..e7b5e6f1 100644
--- a/glsa-201510-04.xml
+++ b/glsa-201510-04.xml
@@ -7,8 +7,8 @@
executive arbitrary code.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>552632</bug>
<access>remote</access>
<affected>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261">CVE-2015-0261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153">CVE-2015-2153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154">CVE-2015-2154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155">CVE-2015-2155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261">CVE-2015-0261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153">CVE-2015-2153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154">CVE-2015-2154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155">CVE-2015-2155</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Aug 2015 15:50:32 +0000">
+ <metadata tag="requester" timestamp="2015-08-04T15:50:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:14:21 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:14:21Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201510-05.xml b/glsa-201510-05.xml
index 17c6fc89..1e246734 100644
--- a/glsa-201510-05.xml
+++ b/glsa-201510-05.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>545944</bug>
<bug>557844</bug>
<access>remote</access>
@@ -61,31 +61,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931">CVE-2015-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932">CVE-2015-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933">CVE-2015-2933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934">CVE-2015-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935">CVE-2015-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936">CVE-2015-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937">CVE-2015-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938">CVE-2015-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939">CVE-2015-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940">CVE-2015-2940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941">CVE-2015-2941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942">CVE-2015-2942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728">CVE-2015-6728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729">CVE-2015-6729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730">CVE-2015-6730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731">CVE-2015-6731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732">CVE-2015-6732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733">CVE-2015-6733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734">CVE-2015-6734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735">CVE-2015-6735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736">CVE-2015-6736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737">CVE-2015-6737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931">CVE-2015-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932">CVE-2015-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933">CVE-2015-2933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934">CVE-2015-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935">CVE-2015-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936">CVE-2015-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937">CVE-2015-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938">CVE-2015-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939">CVE-2015-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940">CVE-2015-2940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941">CVE-2015-2941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942">CVE-2015-2942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728">CVE-2015-6728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729">CVE-2015-6729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730">CVE-2015-6730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731">CVE-2015-6731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732">CVE-2015-6732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733">CVE-2015-6733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734">CVE-2015-6734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735">CVE-2015-6735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736">CVE-2015-6736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737">CVE-2015-6737</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Oct 2015 02:28:01 +0000">
+ <metadata tag="requester" timestamp="2015-10-10T02:28:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:16:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:16:38Z">ackle</metadata>
</glsa>
diff --git a/glsa-201510-06.xml b/glsa-201510-06.xml
index 7e47d69b..debbd22f 100644
--- a/glsa-201510-06.xml
+++ b/glsa-201510-06.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to cause Denial of Service.
</synopsis>
<product type="ebuild">django</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>554864</bug>
<access>remote</access>
<affected>
@@ -67,12 +67,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5143">CVE-2015-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5144">CVE-2015-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5145">CVE-2015-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5143">CVE-2015-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5144">CVE-2015-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5145">CVE-2015-5145</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Oct 2015 02:24:53 +0000">
+ <metadata tag="requester" timestamp="2015-10-10T02:24:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:22:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:22:32Z">ackle</metadata>
</glsa>
diff --git a/glsa-201510-07.xml b/glsa-201510-07.xml
index 1d6dd4c2..dac649c6 100644
--- a/glsa-201510-07.xml
+++ b/glsa-201510-07.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cups</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>551846</bug>
<access>remote</access>
<affected>
@@ -42,11 +42,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1158">CVE-2015-1158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1159">CVE-2015-1159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1158">CVE-2015-1158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1159">CVE-2015-1159</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 23:00:11 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T23:00:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:26:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:26:37Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201510-08.xml b/glsa-201510-08.xml
index 7ffe94ef..391609db 100644
--- a/glsa-201510-08.xml
+++ b/glsa-201510-08.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cups-filters</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>553644</bug>
<bug>553836</bug>
<access>remote</access>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3258">CVE-2015-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3279">CVE-2015-3279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3258">CVE-2015-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3279">CVE-2015-3279</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 22:36:13 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T22:36:13Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:30:50 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:30:50Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201511-01.xml b/glsa-201511-01.xml
index 9743c1e2..1050fd42 100644
--- a/glsa-201511-01.xml
+++ b/glsa-201511-01.xml
@@ -5,9 +5,9 @@
<synopsis>An attacker who already had access to the environment could so
append values to parameters passed through programs.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 02, 2015</announced>
- <revised>November 02, 2015: 2</revised>
+ <product type="ebuild"/>
+ <announced>2015-11-02</announced>
+ <revised>2015-11-02: 2</revised>
<bug>524414</bug>
<access>local</access>
<affected>
@@ -52,6 +52,6 @@
mksh R50c released, security fix
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Dec 2014 08:13:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Nov 2015 15:33:07 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2014-12-12T08:13:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-11-02T15:33:07Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201511-02.xml b/glsa-201511-02.xml
index 5118dc08..e3ff45ff 100644
--- a/glsa-201511-02.xml
+++ b/glsa-201511-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 17, 2015</announced>
- <revised>November 17, 2015: 1</revised>
+ <announced>2015-11-17</announced>
+ <revised>2015-11-17: 1</revised>
<bug>563014</bug>
<bug>563172</bug>
<bug>565318</bug>
@@ -48,41 +48,41 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569">CVE-2015-5569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625">CVE-2015-7625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626">CVE-2015-7626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627">CVE-2015-7627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628">CVE-2015-7628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629">CVE-2015-7629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630">CVE-2015-7630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631">CVE-2015-7631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632">CVE-2015-7632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633">CVE-2015-7633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634">CVE-2015-7634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643">CVE-2015-7643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644">CVE-2015-7644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645">CVE-2015-7645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646">CVE-2015-7646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647">CVE-2015-7647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648">CVE-2015-7648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651">CVE-2015-7651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652">CVE-2015-7652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653">CVE-2015-7653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654">CVE-2015-7654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655">CVE-2015-7655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656">CVE-2015-7656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657">CVE-2015-7657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658">CVE-2015-7658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659">CVE-2015-7659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660">CVE-2015-7660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661">CVE-2015-7661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662">CVE-2015-7662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663">CVE-2015-7663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042">CVE-2015-8042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043">CVE-2015-8043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044">CVE-2015-8044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046">CVE-2015-8046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569">CVE-2015-5569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625">CVE-2015-7625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626">CVE-2015-7626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627">CVE-2015-7627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628">CVE-2015-7628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629">CVE-2015-7629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630">CVE-2015-7630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631">CVE-2015-7631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632">CVE-2015-7632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633">CVE-2015-7633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634">CVE-2015-7634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643">CVE-2015-7643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644">CVE-2015-7644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645">CVE-2015-7645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646">CVE-2015-7646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647">CVE-2015-7647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648">CVE-2015-7648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651">CVE-2015-7651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652">CVE-2015-7652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653">CVE-2015-7653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654">CVE-2015-7654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655">CVE-2015-7655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656">CVE-2015-7656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657">CVE-2015-7657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658">CVE-2015-7658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659">CVE-2015-7659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660">CVE-2015-7660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661">CVE-2015-7661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662">CVE-2015-7662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663">CVE-2015-7663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042">CVE-2015-8042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043">CVE-2015-8043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044">CVE-2015-8044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046">CVE-2015-8046</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Oct 2015 14:56:04 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Nov 2015 11:42:29 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-10-31T14:56:04Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-11-17T11:42:29Z">K_F</metadata>
</glsa>
diff --git a/glsa-201512-01.xml b/glsa-201512-01.xml
index 2644755f..53130fc2 100644
--- a/glsa-201512-01.xml
+++ b/glsa-201512-01.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>December 17, 2015</announced>
- <revised>December 17, 2015: 1</revised>
+ <announced>2015-12-17</announced>
+ <revised>2015-12-17: 1</revised>
<bug>547966</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3294">CVE-2015-3294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3294">CVE-2015-3294</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Aug 2015 14:11:32 +0000">
+ <metadata tag="requester" timestamp="2015-08-04T14:11:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Dec 2015 15:30:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-17T15:30:29Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-02.xml b/glsa-201512-02.xml
index 7e12a0f2..3115d9ba 100644
--- a/glsa-201512-02.xml
+++ b/glsa-201512-02.xml
@@ -6,8 +6,8 @@
JavaScript.
</synopsis>
<product type="ebuild">ipython</product>
- <announced>December 17, 2015</announced>
- <revised>December 17, 2015: 1</revised>
+ <announced>2015-12-17</announced>
+ <revised>2015-12-17: 1</revised>
<bug>560708</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7337">CVE-2015-7337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7337">CVE-2015-7337</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Sep 2015 01:14:10 +0000">
+ <metadata tag="requester" timestamp="2015-09-24T01:14:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Dec 2015 16:41:41 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-17T16:41:41Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-03.xml b/glsa-201512-03.xml
index d61b21a4..74f4618b 100644
--- a/glsa-201512-03.xml
+++ b/glsa-201512-03.xml
@@ -1,63 +1,63 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-<glsa id="201512-03">
- <title>GRUB: Authentication bypass</title>
- <synopsis>GRUB's authentication prompt can be bypassed by entering a sequence
- of backspace characters.
- </synopsis>
- <product type="ebuild">grub</product>
- <announced>December 19, 2015</announced>
- <revised>December 19, 2015: 1</revised>
- <bug>568326</bug>
- <access>local</access>
- <affected>
- <package name="sys-boot/grub" auto="no" arch="*">
- <unaffected range="ge">2.02_beta2-r8</unaffected>
- <unaffected range="rge">0.97</unaffected>
- <vulnerable range="lt">2.02_beta2-r8</vulnerable>
- </package>
- </affected>
- <background>
- <p>GNU GRUB is a multiboot boot loader used by most Linux systems.</p>
- </background>
- <description>
- <p>An integer underflow in GRUB’s username/password authentication code
- has been discovered.
- </p>
- </description>
- <impact type="normal">
- <p>An attacker with access to the system console may bypass the username
- prompt by entering a sequence of backspace characters, allowing them e.g.
- to get full access to GRUB’s console or to load a customized kernel.
- </p>
- </impact>
- <workaround>
- <p>There is no known workaround at this time.</p>
- </workaround>
- <resolution>
- <p>All GRUB 2.x users should upgrade to the latest version:</p>
-
- <code>
- # emerge --sync
- # emerge --ask --oneshot --verbose "&gt;=sys-boot/grub-2.02_beta2-r8"
- </code>
-
- <p>After upgrading, make sure to run the grub2-install command with options
- appropriate for your system. See the GRUB2 Quick Start guide in the
- references below for examples. Your system will be vulnerable until this
- action is performed.
- </p>
- </resolution>
- <references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8370">CVE-2015-8370</uri>
- <uri link="https://wiki.gentoo.org/wiki/GRUB2_Quick_Start">GRUB2 Quick
- Start guide
- </uri>
- </references>
- <metadata tag="requester" timestamp="Sat, 19 Dec 2015 13:09:44 +0000">
- keytoaster
- </metadata>
- <metadata tag="submitter" timestamp="Sat, 19 Dec 2015 14:20:07 +0000">
- keytoaster
- </metadata>
-</glsa> \ No newline at end of file
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201512-03">
+ <title>GRUB: Authentication bypass</title>
+ <synopsis>GRUB's authentication prompt can be bypassed by entering a sequence
+ of backspace characters.
+ </synopsis>
+ <product type="ebuild">grub</product>
+ <announced>2015-12-19</announced>
+ <revised>2015-12-19: 1</revised>
+ <bug>568326</bug>
+ <access>local</access>
+ <affected>
+ <package name="sys-boot/grub" auto="no" arch="*">
+ <unaffected range="ge">2.02_beta2-r8</unaffected>
+ <unaffected range="rge">0.97</unaffected>
+ <vulnerable range="lt">2.02_beta2-r8</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>GNU GRUB is a multiboot boot loader used by most Linux systems.</p>
+ </background>
+ <description>
+ <p>An integer underflow in GRUB’s username/password authentication code
+ has been discovered.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>An attacker with access to the system console may bypass the username
+ prompt by entering a sequence of backspace characters, allowing them e.g.
+ to get full access to GRUB’s console or to load a customized kernel.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GRUB 2.x users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=sys-boot/grub-2.02_beta2-r8"
+ </code>
+
+ <p>After upgrading, make sure to run the grub2-install command with options
+ appropriate for your system. See the GRUB2 Quick Start guide in the
+ references below for examples. Your system will be vulnerable until this
+ action is performed.
+ </p>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8370">CVE-2015-8370</uri>
+ <uri link="https://wiki.gentoo.org/wiki/GRUB2_Quick_Start">GRUB2 Quick
+ Start guide
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2015-12-19T13:09:44Z">
+ keytoaster
+ </metadata>
+ <metadata tag="submitter" timestamp="2015-12-19T14:20:07Z">
+ keytoaster
+ </metadata>
+</glsa>
diff --git a/glsa-201512-04.xml b/glsa-201512-04.xml
index d50b71bc..c23dc834 100644
--- a/glsa-201512-04.xml
+++ b/glsa-201512-04.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>December 20, 2015</announced>
- <revised>December 21, 2015: 4</revised>
+ <announced>2015-12-20</announced>
+ <revised>2015-12-21: 4</revised>
<bug>553724</bug>
<bug>555518</bug>
<bug>557340</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352">CVE-2015-5352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600">CVE-2015-5600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563">CVE-2015-6563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564">CVE-2015-6564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565">CVE-2015-6565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352">CVE-2015-5352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600">CVE-2015-5600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563">CVE-2015-6563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564">CVE-2015-6564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565">CVE-2015-6565</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jul 2015 17:49:28 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Dec 2015 15:58:43 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-07-22T17:49:28Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-12-21T15:58:43Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-05.xml b/glsa-201512-05.xml
index 7a650cfa..0911edda 100644
--- a/glsa-201512-05.xml
+++ b/glsa-201512-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">gdk-pixbuf</product>
- <announced>December 21, 2015</announced>
- <revised>December 21, 2015: 1</revised>
+ <announced>2015-12-21</announced>
+ <revised>2015-12-21: 1</revised>
<bug>556314</bug>
<bug>562878</bug>
<bug>562880</bug>
@@ -50,12 +50,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7673">CVE-2015-7673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7674">CVE-2015-7674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7673">CVE-2015-7673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7674">CVE-2015-7674</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Oct 2015 00:53:43 +0000">
+ <metadata tag="requester" timestamp="2015-10-13T00:53:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Dec 2015 14:06:18 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-21T14:06:18Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-06.xml b/glsa-201512-06.xml
index 11bf2a9b..f2b3d506 100644
--- a/glsa-201512-06.xml
+++ b/glsa-201512-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mpfr</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>532028</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474">CVE-2014-9474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474">CVE-2014-9474</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Nov 2015 03:47:08 +0000">
+ <metadata tag="requester" timestamp="2015-11-03T03:47:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 10:56:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T10:56:32Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-07.xml b/glsa-201512-07.xml
index 425328a8..9507b17f 100644
--- a/glsa-201512-07.xml
+++ b/glsa-201512-07.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">gstreamer</product>
- <announced>December 30, 2015</announced>
- <revised>February 09, 2016: 3</revised>
+ <announced>2015-12-30</announced>
+ <revised>2016-02-09: 3</revised>
<bug>553742</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0797">CVE-2015-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0797">CVE-2015-0797</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Nov 2015 14:47:48 +0000">
+ <metadata tag="requester" timestamp="2015-11-22T14:47:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Feb 2016 20:37:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2016-02-09T20:37:29Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-08.xml b/glsa-201512-08.xml
index cdae0425..0c315e32 100644
--- a/glsa-201512-08.xml
+++ b/glsa-201512-08.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>538084</bug>
<bug>548066</bug>
<access>local</access>
@@ -43,17 +43,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9328">CVE-2014-9328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1461">CVE-2015-1461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1462">CVE-2015-1462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1463">CVE-2015-1463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2170">CVE-2015-2170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2221">CVE-2015-2221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2222">CVE-2015-2222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2668">CVE-2015-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9328">CVE-2014-9328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1461">CVE-2015-1461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1462">CVE-2015-1462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1463">CVE-2015-1463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2170">CVE-2015-2170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2221">CVE-2015-2221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2222">CVE-2015-2222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2668">CVE-2015-2668</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Nov 2015 22:28:34 +0000">
+ <metadata tag="requester" timestamp="2015-11-02T22:28:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 13:55:58 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T13:55:58Z">ackle</metadata>
</glsa>
diff --git a/glsa-201512-09.xml b/glsa-201512-09.xml
index d1664156..cfdfcfb4 100644
--- a/glsa-201512-09.xml
+++ b/glsa-201512-09.xml
@@ -7,8 +7,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">encfs</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>510290</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3462">CVE-2014-3462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3462">CVE-2014-3462</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:35:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 14:32:13 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:35:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T14:32:13Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201512-10.xml b/glsa-201512-10.xml
index d05e896b..0059fd85 100644
--- a/glsa-201512-10.xml
+++ b/glsa-201512-10.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">thunderbird firefox</product>
- <announced>December 30, 2015</announced>
- <revised>December 31, 2015: 2</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-31: 2</revised>
<bug>545232</bug>
<bug>554036</bug>
<bug>556942</bug>
@@ -86,93 +86,93 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798">CVE-2015-0798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799">CVE-2015-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801">CVE-2015-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802">CVE-2015-0802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803">CVE-2015-0803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804">CVE-2015-0804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805">CVE-2015-0805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806">CVE-2015-0806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807">CVE-2015-0807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808">CVE-2015-0808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810">CVE-2015-0810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811">CVE-2015-0811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812">CVE-2015-0812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813">CVE-2015-0813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814">CVE-2015-0814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815">CVE-2015-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816">CVE-2015-0816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706">CVE-2015-2706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722">CVE-2015-2722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724">CVE-2015-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725">CVE-2015-2725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726">CVE-2015-2726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727">CVE-2015-2727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728">CVE-2015-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729">CVE-2015-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730">CVE-2015-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731">CVE-2015-2731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733">CVE-2015-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734">CVE-2015-2734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735">CVE-2015-2735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736">CVE-2015-2736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737">CVE-2015-2737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738">CVE-2015-2738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739">CVE-2015-2739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740">CVE-2015-2740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741">CVE-2015-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742">CVE-2015-2742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743">CVE-2015-2743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808">CVE-2015-2808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4153">CVE-2015-4153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495">CVE-2015-4495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513">CVE-2015-4513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514">CVE-2015-4514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515">CVE-2015-4515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518">CVE-2015-4518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187">CVE-2015-7187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188">CVE-2015-7188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189">CVE-2015-7189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191">CVE-2015-7191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192">CVE-2015-7192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193">CVE-2015-7193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194">CVE-2015-7194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195">CVE-2015-7195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196">CVE-2015-7196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197">CVE-2015-7197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198">CVE-2015-7198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199">CVE-2015-7199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200">CVE-2015-7200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201">CVE-2015-7201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202">CVE-2015-7202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203">CVE-2015-7203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204">CVE-2015-7204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205">CVE-2015-7205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207">CVE-2015-7207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208">CVE-2015-7208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210">CVE-2015-7210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211">CVE-2015-7211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212">CVE-2015-7212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213">CVE-2015-7213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214">CVE-2015-7214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215">CVE-2015-7215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216">CVE-2015-7216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217">CVE-2015-7217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218">CVE-2015-7218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219">CVE-2015-7219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220">CVE-2015-7220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221">CVE-2015-7221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222">CVE-2015-7222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223">CVE-2015-7223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798">CVE-2015-0798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799">CVE-2015-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801">CVE-2015-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802">CVE-2015-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803">CVE-2015-0803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804">CVE-2015-0804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805">CVE-2015-0805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806">CVE-2015-0806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807">CVE-2015-0807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808">CVE-2015-0808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810">CVE-2015-0810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811">CVE-2015-0811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812">CVE-2015-0812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813">CVE-2015-0813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814">CVE-2015-0814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815">CVE-2015-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816">CVE-2015-0816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706">CVE-2015-2706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722">CVE-2015-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724">CVE-2015-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725">CVE-2015-2725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726">CVE-2015-2726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727">CVE-2015-2727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728">CVE-2015-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729">CVE-2015-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730">CVE-2015-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731">CVE-2015-2731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733">CVE-2015-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734">CVE-2015-2734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735">CVE-2015-2735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736">CVE-2015-2736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737">CVE-2015-2737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738">CVE-2015-2738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739">CVE-2015-2739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740">CVE-2015-2740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741">CVE-2015-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742">CVE-2015-2742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743">CVE-2015-2743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808">CVE-2015-2808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4153">CVE-2015-4153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495">CVE-2015-4495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513">CVE-2015-4513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514">CVE-2015-4514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515">CVE-2015-4515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518">CVE-2015-4518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187">CVE-2015-7187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188">CVE-2015-7188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189">CVE-2015-7189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191">CVE-2015-7191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192">CVE-2015-7192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193">CVE-2015-7193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194">CVE-2015-7194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195">CVE-2015-7195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196">CVE-2015-7196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197">CVE-2015-7197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198">CVE-2015-7198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199">CVE-2015-7199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200">CVE-2015-7200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201">CVE-2015-7201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202">CVE-2015-7202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203">CVE-2015-7203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204">CVE-2015-7204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205">CVE-2015-7205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207">CVE-2015-7207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208">CVE-2015-7208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210">CVE-2015-7210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211">CVE-2015-7211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212">CVE-2015-7212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213">CVE-2015-7213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214">CVE-2015-7214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215">CVE-2015-7215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216">CVE-2015-7216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217">CVE-2015-7217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218">CVE-2015-7218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219">CVE-2015-7219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220">CVE-2015-7220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221">CVE-2015-7221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222">CVE-2015-7222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223">CVE-2015-7223</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 13:56:14 +0000">
+ <metadata tag="requester" timestamp="2015-07-16T13:56:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 31 Dec 2015 01:25:05 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-12-31T01:25:05Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201512-11.xml b/glsa-201512-11.xml
index 821694d2..0d744a89 100644
--- a/glsa-201512-11.xml
+++ b/glsa-201512-11.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>460780</bug>
<access>remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2492">CVE-2013-2492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2492">CVE-2013-2492</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 13:57:42 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T13:57:42Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 16:24:28 +0000">
+ <metadata tag="submitter" timestamp="2015-12-30T16:24:28Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201512-12.xml b/glsa-201512-12.xml
index e6c9ac71..f1302db8 100644
--- a/glsa-201512-12.xml
+++ b/glsa-201512-12.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">systemsettings</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>528468</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651">CVE-2014-8651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651">CVE-2014-8651</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Jun 2015 07:50:15 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 20:52:40 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-06-03T07:50:15Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T20:52:40Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201512-13.xml b/glsa-201512-13.xml
index 66778c4d..88829007 100644
--- a/glsa-201512-13.xml
+++ b/glsa-201512-13.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">inspircd</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>545034</bug>
<bug>570244</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6697">CVE-2012-6697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6674">CVE-2015-6674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8702">CVE-2015-8702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6697">CVE-2012-6697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6674">CVE-2015-6674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8702">CVE-2015-8702</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Sep 2015 05:28:16 +0000">
+ <metadata tag="requester" timestamp="2015-09-27T05:28:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 21:15:00 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T21:15:00Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201601-01.xml b/glsa-201601-01.xml
index f5ce4ed9..bfb1d654 100644
--- a/glsa-201601-01.xml
+++ b/glsa-201601-01.xml
@@ -6,8 +6,8 @@
attackers to leak client memory to a server, including private keys.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>January 16, 2016</announced>
- <revised>January 16, 2016: 1</revised>
+ <announced>2016-01-16</announced>
+ <revised>2016-01-16: 1</revised>
<bug>571892</bug>
<access>remote</access>
<affected>
@@ -58,9 +58,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777">CVE-2016-0777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778">CVE-2016-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777">CVE-2016-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778">CVE-2016-0778</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Jan 2016 09:15:59 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jan 2016 18:56:11 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2016-01-14T09:15:59Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2016-01-16T18:56:11Z">a3li</metadata>
</glsa>
diff --git a/glsa-201601-02.xml b/glsa-201601-02.xml
index 962bf0a2..2b785f43 100644
--- a/glsa-201601-02.xml
+++ b/glsa-201601-02.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">webkit-gtk</product>
- <announced>January 26, 2016</announced>
- <revised>January 26, 2016: 1</revised>
+ <announced>2016-01-26</announced>
+ <revised>2016-01-26: 1</revised>
<bug>536234</bug>
<access>remote</access>
<affected>
@@ -51,17 +51,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1344">CVE-2014-1344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1384">CVE-2014-1384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1385">CVE-2014-1385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1386">CVE-2014-1386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1387">CVE-2014-1387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1388">CVE-2014-1388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1389">CVE-2014-1389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1390">CVE-2014-1390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1344">CVE-2014-1344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1384">CVE-2014-1384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1385">CVE-2014-1385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1386">CVE-2014-1386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1387">CVE-2014-1387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1388">CVE-2014-1388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1389">CVE-2014-1389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1390">CVE-2014-1390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:45:27 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:45:27Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Jan 2016 19:47:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2016-01-26T19:47:29Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201601-03.xml b/glsa-201601-03.xml
index 2cc5c4a8..bc787b7d 100644
--- a/glsa-201601-03.xml
+++ b/glsa-201601-03.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe flash</product>
- <announced>January 26, 2016</announced>
- <revised>January 26, 2016: 1</revised>
+ <announced>2016-01-26</announced>
+ <revised>2016-01-26: 1</revised>
<bug>567838</bug>
<bug>570040</bug>
<access>remote</access>
@@ -47,106 +47,106 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045">CVE-2015-8045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047">CVE-2015-8047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048">CVE-2015-8048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049">CVE-2015-8049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050">CVE-2015-8050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055">CVE-2015-8055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056">CVE-2015-8056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057">CVE-2015-8057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058">CVE-2015-8058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059">CVE-2015-8059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060">CVE-2015-8060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061">CVE-2015-8061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062">CVE-2015-8062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063">CVE-2015-8063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064">CVE-2015-8064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065">CVE-2015-8065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066">CVE-2015-8066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067">CVE-2015-8067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068">CVE-2015-8068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069">CVE-2015-8069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070">CVE-2015-8070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071">CVE-2015-8071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401">CVE-2015-8401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402">CVE-2015-8402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403">CVE-2015-8403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404">CVE-2015-8404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405">CVE-2015-8405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406">CVE-2015-8406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407">CVE-2015-8407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408">CVE-2015-8408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409">CVE-2015-8409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410">CVE-2015-8410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411">CVE-2015-8411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412">CVE-2015-8412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413">CVE-2015-8413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414">CVE-2015-8414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415">CVE-2015-8415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416">CVE-2015-8416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417">CVE-2015-8417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418">CVE-2015-8418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419">CVE-2015-8419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420">CVE-2015-8420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421">CVE-2015-8421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422">CVE-2015-8422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423">CVE-2015-8423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424">CVE-2015-8424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425">CVE-2015-8425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426">CVE-2015-8426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427">CVE-2015-8427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428">CVE-2015-8428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429">CVE-2015-8429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430">CVE-2015-8430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431">CVE-2015-8431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432">CVE-2015-8432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433">CVE-2015-8433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434">CVE-2015-8434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435">CVE-2015-8435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436">CVE-2015-8436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437">CVE-2015-8437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438">CVE-2015-8438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439">CVE-2015-8439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440">CVE-2015-8440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441">CVE-2015-8441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442">CVE-2015-8442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445">CVE-2015-8445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446">CVE-2015-8446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447">CVE-2015-8447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448">CVE-2015-8448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449">CVE-2015-8449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450">CVE-2015-8450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451">CVE-2015-8451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452">CVE-2015-8452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453">CVE-2015-8453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454">CVE-2015-8454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455">CVE-2015-8455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459">CVE-2015-8459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460">CVE-2015-8460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635">CVE-2015-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636">CVE-2015-8636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638">CVE-2015-8638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639">CVE-2015-8639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640">CVE-2015-8640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641">CVE-2015-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642">CVE-2015-8642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643">CVE-2015-8643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644">CVE-2015-8644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645">CVE-2015-8645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646">CVE-2015-8646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647">CVE-2015-8647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648">CVE-2015-8648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649">CVE-2015-8649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650">CVE-2015-8650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651">CVE-2015-8651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045">CVE-2015-8045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047">CVE-2015-8047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048">CVE-2015-8048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049">CVE-2015-8049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050">CVE-2015-8050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055">CVE-2015-8055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056">CVE-2015-8056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057">CVE-2015-8057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058">CVE-2015-8058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059">CVE-2015-8059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060">CVE-2015-8060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061">CVE-2015-8061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062">CVE-2015-8062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063">CVE-2015-8063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064">CVE-2015-8064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065">CVE-2015-8065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066">CVE-2015-8066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067">CVE-2015-8067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068">CVE-2015-8068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069">CVE-2015-8069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070">CVE-2015-8070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071">CVE-2015-8071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401">CVE-2015-8401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402">CVE-2015-8402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403">CVE-2015-8403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404">CVE-2015-8404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405">CVE-2015-8405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406">CVE-2015-8406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407">CVE-2015-8407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408">CVE-2015-8408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409">CVE-2015-8409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410">CVE-2015-8410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411">CVE-2015-8411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412">CVE-2015-8412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413">CVE-2015-8413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414">CVE-2015-8414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415">CVE-2015-8415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416">CVE-2015-8416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417">CVE-2015-8417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418">CVE-2015-8418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419">CVE-2015-8419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420">CVE-2015-8420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421">CVE-2015-8421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422">CVE-2015-8422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423">CVE-2015-8423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424">CVE-2015-8424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425">CVE-2015-8425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426">CVE-2015-8426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427">CVE-2015-8427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428">CVE-2015-8428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429">CVE-2015-8429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430">CVE-2015-8430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431">CVE-2015-8431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432">CVE-2015-8432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433">CVE-2015-8433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434">CVE-2015-8434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435">CVE-2015-8435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436">CVE-2015-8436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437">CVE-2015-8437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438">CVE-2015-8438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439">CVE-2015-8439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440">CVE-2015-8440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441">CVE-2015-8441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442">CVE-2015-8442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445">CVE-2015-8445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446">CVE-2015-8446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447">CVE-2015-8447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448">CVE-2015-8448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449">CVE-2015-8449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450">CVE-2015-8450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451">CVE-2015-8451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452">CVE-2015-8452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453">CVE-2015-8453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454">CVE-2015-8454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455">CVE-2015-8455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459">CVE-2015-8459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460">CVE-2015-8460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635">CVE-2015-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636">CVE-2015-8636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638">CVE-2015-8638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639">CVE-2015-8639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640">CVE-2015-8640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641">CVE-2015-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642">CVE-2015-8642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643">CVE-2015-8643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644">CVE-2015-8644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645">CVE-2015-8645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646">CVE-2015-8646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647">CVE-2015-8647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648">CVE-2015-8648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649">CVE-2015-8649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650">CVE-2015-8650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651">CVE-2015-8651</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:43:53 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:43:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Jan 2016 20:18:57 +0000">
+ <metadata tag="submitter" timestamp="2016-01-26T20:18:57Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201601-04.xml b/glsa-201601-04.xml
index 8d4f7979..3245242a 100644
--- a/glsa-201601-04.xml
+++ b/glsa-201601-04.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">opensmtpd</product>
- <announced>January 27, 2016</announced>
- <revised>January 27, 2016: 1</revised>
+ <announced>2016-01-27</announced>
+ <revised>2016-01-27: 1</revised>
<bug>562034</bug>
<bug>562290</bug>
<access>remote</access>
@@ -44,6 +44,6 @@
</resolution>
<references>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Oct 2015 13:05:33 +0000">mrueg</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Jan 2016 06:43:42 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-10-02T13:05:33Z">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2016-01-27T06:43:42Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201601-05.xml b/glsa-201601-05.xml
index 69223e82..e84d2b1c 100644
--- a/glsa-201601-05.xml
+++ b/glsa-201601-05.xml
@@ -7,8 +7,8 @@
handshakes.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>January 29, 2016</announced>
- <revised>February 26, 2016: 3</revised>
+ <announced>2016-01-29</announced>
+ <revised>2016-02-26: 3</revised>
<bug>572854</bug>
<access>remote</access>
<affected>
@@ -60,21 +60,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1794">CVE-2015-1794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3193">CVE-2015-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3194">CVE-2015-3194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3195">CVE-2015-3195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3196">CVE-2015-3196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3197">CVE-2015-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0701">CVE-2016-0701</uri>
- <uri link="http://openssl.org/news/secadv/20160128.txt">OpenSSL Security
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1794">CVE-2015-1794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3193">CVE-2015-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3194">CVE-2015-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3195">CVE-2015-3195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3196">CVE-2015-3196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3197">CVE-2015-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0701">CVE-2016-0701</uri>
+ <uri link="https://openssl.org/news/secadv/20160128.txt">OpenSSL Security
Advisory [28th Jan 2016]
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jan 2016 23:06:05 +0000">
+ <metadata tag="requester" timestamp="2016-01-29T23:06:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 15:29:47 +0000">
+ <metadata tag="submitter" timestamp="2016-02-26T15:29:47Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201602-01.xml b/glsa-201602-01.xml
index c23826c7..f9c6b14a 100644
--- a/glsa-201602-01.xml
+++ b/glsa-201602-01.xml
@@ -7,8 +7,8 @@
elevated privileges from a guest VM.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>February 04, 2016</announced>
- <revised>February 04, 2016: 1</revised>
+ <announced>2016-02-04</announced>
+ <revised>2016-02-04: 1</revised>
<bug>544328</bug>
<bug>549404</bug>
<bug>557206</bug>
@@ -63,31 +63,31 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1779">CVE-2015-1779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5225">CVE-2015-5225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5278">CVE-2015-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5279">CVE-2015-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5745">CVE-2015-5745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6815">CVE-2015-6815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6855">CVE-2015-6855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7295">CVE-2015-7295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7512">CVE-2015-7512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7549">CVE-2015-7549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8345">CVE-2015-8345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8504">CVE-2015-8504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8556">CVE-2015-8556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8558">CVE-2015-8558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8567">CVE-2015-8567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8568">CVE-2015-8568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8666">CVE-2015-8666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8701">CVE-2015-8701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8743">CVE-2015-8743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8744">CVE-2015-8744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8745">CVE-2015-8745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1568">CVE-2016-1568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1779">CVE-2015-1779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5225">CVE-2015-5225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5278">CVE-2015-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5279">CVE-2015-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5745">CVE-2015-5745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6815">CVE-2015-6815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6855">CVE-2015-6855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7295">CVE-2015-7295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7512">CVE-2015-7512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7549">CVE-2015-7549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8345">CVE-2015-8345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8504">CVE-2015-8504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8556">CVE-2015-8556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8558">CVE-2015-8558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8567">CVE-2015-8567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8568">CVE-2015-8568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8666">CVE-2015-8666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8701">CVE-2015-8701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8743">CVE-2015-8743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8744">CVE-2015-8744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8745">CVE-2015-8745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1568">CVE-2016-1568</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Nov 2015 21:30:41 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 Feb 2016 09:23:14 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-11-16T21:30:41Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-02-04T09:23:14Z">K_F</metadata>
</glsa>
diff --git a/glsa-201602-02.xml b/glsa-201602-02.xml
index 2336c9d4..15fc874d 100644
--- a/glsa-201602-02.xml
+++ b/glsa-201602-02.xml
@@ -6,8 +6,8 @@
worst allowing for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>February 17, 2016</announced>
- <revised>February 17, 2016: 1</revised>
+ <announced>2016-02-17</announced>
+ <revised>2016-02-17: 1</revised>
<bug>516884</bug>
<bug>517082</bug>
<bug>521932</bug>
@@ -88,29 +88,29 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7423">CVE-2013-7423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5119">CVE-2014-5119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6040">CVE-2014-6040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817">CVE-2014-7817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8121">CVE-2014-8121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9402">CVE-2014-9402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1472">CVE-2015-1472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1781">CVE-2015-1781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7547">CVE-2015-7547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7423">CVE-2013-7423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5119">CVE-2014-5119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6040">CVE-2014-6040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817">CVE-2014-7817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8121">CVE-2014-8121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9402">CVE-2014-9402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1472">CVE-2015-1472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1781">CVE-2015-1781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7547">CVE-2015-7547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
<uri link="https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html">
Google Online Security Blog: "CVE-2015-7547: glibc getaddrinfo
stack-based buffer overflow"
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Feb 2016 18:27:02 +0000">
+ <metadata tag="requester" timestamp="2016-02-16T18:27:02Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Feb 2016 15:37:09 +0000">
+ <metadata tag="submitter" timestamp="2016-02-17T15:37:09Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201602-03.xml b/glsa-201602-03.xml
index bf7e97ac..669fafe4 100644
--- a/glsa-201602-03.xml
+++ b/glsa-201602-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libwmf allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>February 27, 2016</announced>
- <revised>February 27, 2016: 3</revised>
+ <product type="ebuild"/>
+ <announced>2016-02-27</announced>
+ <revised>2016-02-27: 3</revised>
<bug>551144</bug>
<bug>553818</bug>
<access>remote</access>
@@ -41,21 +41,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0848">
+ <uri link="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0848">
CVE-2015-0848
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4588">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4588">
CVE-2015-4588
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4695">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4695">
CVE-2015-4695
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4696">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4696">
CVE-2015-4696
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 06:44:07 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T06:44:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Feb 2016 02:04:39 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-02-27T02:04:39Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-01.xml b/glsa-201603-01.xml
index db972289..32c5d763 100644
--- a/glsa-201603-01.xml
+++ b/glsa-201603-01.xml
@@ -6,8 +6,8 @@
in the execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>March 06, 2016</announced>
- <revised>May 04, 2016: 2</revised>
+ <announced>2016-03-06</announced>
+ <revised>2016-05-04: 2</revised>
<bug>434582</bug>
<bug>493372</bug>
<access>remote</access>
@@ -49,14 +49,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4245">CVE-2012-4245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4245">CVE-2012-4245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913">
CVE-2013-1913
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978">
CVE-2013-1978
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Mar 2016 11:01:16 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 May 2016 00:41:21 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-02T11:01:16Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-04T00:41:21Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-02.xml b/glsa-201603-02.xml
index 5463f57a..1d2216a5 100644
--- a/glsa-201603-02.xml
+++ b/glsa-201603-02.xml
@@ -3,9 +3,9 @@
<glsa id="201603-02">
<title>OSC: Shell command injection</title>
<synopsis>OSC is vulnerable to the remote execution of arbitrary code.</synopsis>
- <product type="ebuild"></product>
- <announced>March 06, 2016</announced>
- <revised>March 06, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-06</announced>
+ <revised>2016-03-06: 1</revised>
<bug>553606</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0778">CVE-2015-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0778">CVE-2015-0778</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:51:12 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:51:12Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Mar 2016 20:01:57 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-06T20:01:57Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-03.xml b/glsa-201603-03.xml
index d3beb902..656bfbeb 100644
--- a/glsa-201603-03.xml
+++ b/glsa-201603-03.xml
@@ -7,8 +7,8 @@
scripts, and perform cross-site scripting (XSS).
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>554866</bug>
<bug>564476</bug>
<bug>570336</bug>
@@ -48,13 +48,13 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8105">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8105">
CVE-2015-8105
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770">
CVE-2015-8770
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:35:16 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 09:28:53 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-08T20:35:16Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T09:28:53Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-04.xml b/glsa-201603-04.xml
index 9415916f..47618573 100644
--- a/glsa-201603-04.xml
+++ b/glsa-201603-04.xml
@@ -9,8 +9,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fuse</product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>550152</bug>
<access>local</access>
<affected>
@@ -48,12 +48,12 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202">
CVE-2015-3202
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Sep 2015 05:09:39 +0000">
+ <metadata tag="requester" timestamp="2015-09-09T05:09:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 17:59:40 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T17:59:40Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-05.xml b/glsa-201603-05.xml
index 1d39ac04..32a4f560 100644
--- a/glsa-201603-05.xml
+++ b/glsa-201603-05.xml
@@ -6,9 +6,9 @@
OpenOffice allowing remote attackers to execute arbitrary code or cause
Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>521136</bug>
<bug>522060</bug>
<bug>528438</bug>
@@ -85,16 +85,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3524">CVE-2014-3524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3575">CVE-2014-3575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3693">CVE-2014-3693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9093">CVE-2014-9093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1774">CVE-2015-1774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4551">CVE-2015-4551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5212">CVE-2015-5212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5213">CVE-2015-5213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5214">CVE-2015-5214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3524">CVE-2014-3524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3575">CVE-2014-3575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3693">CVE-2014-3693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9093">CVE-2014-9093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1774">CVE-2015-1774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4551">CVE-2015-4551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5212">CVE-2015-5212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5213">CVE-2015-5213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5214">CVE-2015-5214</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Feb 2015 17:50:17 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 18:08:54 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-02-15T17:50:17Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T18:08:54Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-06.xml b/glsa-201603-06.xml
index 64b07184..718b5faf 100644
--- a/glsa-201603-06.xml
+++ b/glsa-201603-06.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">ffmpeg</product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>485228</bug>
<bug>486692</bug>
<bug>488052</bug>
@@ -55,70 +55,70 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0861">CVE-2013-0861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0862">CVE-2013-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0863">CVE-2013-0863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0864">CVE-2013-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0865">CVE-2013-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0866">CVE-2013-0866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0867">CVE-2013-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0872">CVE-2013-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0873">CVE-2013-0873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0874">CVE-2013-0874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0875">CVE-2013-0875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0876">CVE-2013-0876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0877">CVE-2013-0877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0878">CVE-2013-0878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4263">CVE-2013-4263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4264">CVE-2013-4264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4265">CVE-2013-4265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7008">CVE-2013-7008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7009">CVE-2013-7009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7010">CVE-2013-7010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7011">CVE-2013-7011</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7012">CVE-2013-7012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7013">CVE-2013-7013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7014">CVE-2013-7014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7015">CVE-2013-7015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7016">CVE-2013-7016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7017">CVE-2013-7017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7018">CVE-2013-7018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7019">CVE-2013-7019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7020">CVE-2013-7020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7021">CVE-2013-7021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7022">CVE-2013-7022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7023">CVE-2013-7023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7024">CVE-2013-7024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2097">CVE-2014-2097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2098">CVE-2014-2098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2263">CVE-2014-2263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5271">CVE-2014-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5272">CVE-2014-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8541">CVE-2014-8541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8542">CVE-2014-8542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8543">CVE-2014-8543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8544">CVE-2014-8544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8545">CVE-2014-8545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8546">CVE-2014-8546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8547">CVE-2014-8547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8548">CVE-2014-8548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8549">CVE-2014-8549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9316">CVE-2014-9316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9317">CVE-2014-9317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9318">CVE-2014-9318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9319">CVE-2014-9319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9602">CVE-2014-9602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9603">CVE-2014-9603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9604">CVE-2014-9604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0861">CVE-2013-0861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0862">CVE-2013-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0863">CVE-2013-0863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0864">CVE-2013-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0865">CVE-2013-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0866">CVE-2013-0866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0867">CVE-2013-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0872">CVE-2013-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0873">CVE-2013-0873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0874">CVE-2013-0874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0875">CVE-2013-0875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0876">CVE-2013-0876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0877">CVE-2013-0877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0878">CVE-2013-0878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4263">CVE-2013-4263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4264">CVE-2013-4264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4265">CVE-2013-4265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7008">CVE-2013-7008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7009">CVE-2013-7009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7010">CVE-2013-7010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7011">CVE-2013-7011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7012">CVE-2013-7012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7013">CVE-2013-7013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7014">CVE-2013-7014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7015">CVE-2013-7015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7016">CVE-2013-7016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7017">CVE-2013-7017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7018">CVE-2013-7018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7019">CVE-2013-7019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7020">CVE-2013-7020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7021">CVE-2013-7021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7022">CVE-2013-7022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7023">CVE-2013-7023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7024">CVE-2013-7024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2097">CVE-2014-2097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2098">CVE-2014-2098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2263">CVE-2014-2263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5271">CVE-2014-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5272">CVE-2014-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8541">CVE-2014-8541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8542">CVE-2014-8542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8543">CVE-2014-8543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8544">CVE-2014-8544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8545">CVE-2014-8545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8546">CVE-2014-8546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8547">CVE-2014-8547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8548">CVE-2014-8548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8549">CVE-2014-8549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9316">CVE-2014-9316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9317">CVE-2014-9317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9318">CVE-2014-9318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9319">CVE-2014-9319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9602">CVE-2014-9602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9603">CVE-2014-9603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9604">CVE-2014-9604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Aug 2015 14:38:39 +0000">
+ <metadata tag="requester" timestamp="2015-08-14T14:38:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 11:17:31 +0000">
+ <metadata tag="submitter" timestamp="2016-03-12T11:17:31Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201603-07.xml b/glsa-201603-07.xml
index 0e607902..2ef73875 100644
--- a/glsa-201603-07.xml
+++ b/glsa-201603-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>574284</bug>
<bug>576980</bug>
<access>remote</access>
@@ -45,52 +45,52 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0960">CVE-2016-0960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0961">CVE-2016-0961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0962">CVE-2016-0962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0963">CVE-2016-0963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0964">CVE-2016-0964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0965">CVE-2016-0965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0966">CVE-2016-0966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0967">CVE-2016-0967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0968">CVE-2016-0968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0969">CVE-2016-0969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0970">CVE-2016-0970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0971">CVE-2016-0971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0972">CVE-2016-0972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0973">CVE-2016-0973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0974">CVE-2016-0974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0975">CVE-2016-0975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0976">CVE-2016-0976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0977">CVE-2016-0977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0978">CVE-2016-0978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0979">CVE-2016-0979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0980">CVE-2016-0980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0981">CVE-2016-0981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0982">CVE-2016-0982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0983">CVE-2016-0983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0984">CVE-2016-0984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0985">CVE-2016-0985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0986">CVE-2016-0986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0987">CVE-2016-0987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0988">CVE-2016-0988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0989">CVE-2016-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0990">CVE-2016-0990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0991">CVE-2016-0991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0992">CVE-2016-0992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0993">CVE-2016-0993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0994">CVE-2016-0994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0995">CVE-2016-0995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0996">CVE-2016-0996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0997">CVE-2016-0997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0998">CVE-2016-0998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0999">CVE-2016-0999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000">CVE-2016-1000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1001">CVE-2016-1001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1002">CVE-2016-1002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1005">CVE-2016-1005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1010">CVE-2016-1010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0960">CVE-2016-0960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0961">CVE-2016-0961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0962">CVE-2016-0962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0963">CVE-2016-0963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0964">CVE-2016-0964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0965">CVE-2016-0965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0966">CVE-2016-0966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0967">CVE-2016-0967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0968">CVE-2016-0968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0969">CVE-2016-0969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0970">CVE-2016-0970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0971">CVE-2016-0971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0972">CVE-2016-0972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0973">CVE-2016-0973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0974">CVE-2016-0974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0975">CVE-2016-0975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0976">CVE-2016-0976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0977">CVE-2016-0977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0978">CVE-2016-0978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0979">CVE-2016-0979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0980">CVE-2016-0980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0981">CVE-2016-0981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0982">CVE-2016-0982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0983">CVE-2016-0983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0984">CVE-2016-0984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0985">CVE-2016-0985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0986">CVE-2016-0986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0987">CVE-2016-0987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0988">CVE-2016-0988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0989">CVE-2016-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0990">CVE-2016-0990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0991">CVE-2016-0991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0992">CVE-2016-0992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0993">CVE-2016-0993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0994">CVE-2016-0994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0995">CVE-2016-0995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0996">CVE-2016-0996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0997">CVE-2016-0997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0998">CVE-2016-0998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0999">CVE-2016-0999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000">CVE-2016-1000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1001">CVE-2016-1001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1002">CVE-2016-1002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1005">CVE-2016-1005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1010">CVE-2016-1010</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Feb 2016 22:19:19 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 11:32:24 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-10T22:19:19Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T11:32:24Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-08.xml b/glsa-201603-08.xml
index 26391272..45603eb3 100644
--- a/glsa-201603-08.xml
+++ b/glsa-201603-08.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in VLC allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>534532</bug>
<bug>537154</bug>
<bug>542222</bug>
@@ -44,49 +44,49 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1684">CVE-2014-1684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1684">CVE-2014-1684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440">
CVE-2014-6440
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9597">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9597">
CVE-2014-9597
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9598">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9598">
CVE-2014-9598
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9625">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9625">
CVE-2014-9625
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626">
CVE-2014-9626
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627">
CVE-2014-9627
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628">
CVE-2014-9628
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629">
CVE-2014-9629
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630">
CVE-2014-9630
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1202">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1202">
CVE-2015-1202
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1203">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1203">
CVE-2015-1203
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
CVE-2015-5949
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
CVE-2015-5949
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 04:52:22 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T04:52:22Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:00:44 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:00:44Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-09.xml b/glsa-201603-09.xml
index 3d90e1d8..2fc031e2 100644
--- a/glsa-201603-09.xml
+++ b/glsa-201603-09.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>555640</bug>
<bug>559384</bug>
<bug>561448</bug>
@@ -58,111 +58,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270">CVE-2015-1270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271">CVE-2015-1271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272">CVE-2015-1272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273">CVE-2015-1273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274">CVE-2015-1274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275">CVE-2015-1275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276">CVE-2015-1276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277">CVE-2015-1277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278">CVE-2015-1278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279">CVE-2015-1279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280">CVE-2015-1280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281">CVE-2015-1281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282">CVE-2015-1282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284">CVE-2015-1284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285">CVE-2015-1285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286">CVE-2015-1286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287">CVE-2015-1287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288">CVE-2015-1288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289">CVE-2015-1289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291">CVE-2015-1291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292">CVE-2015-1292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293">CVE-2015-1293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294">CVE-2015-1294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295">CVE-2015-1295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296">CVE-2015-1296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297">CVE-2015-1297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298">CVE-2015-1298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299">CVE-2015-1299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300">CVE-2015-1300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302">CVE-2015-1302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303">CVE-2015-1303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304">CVE-2015-1304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755">CVE-2015-6755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756">CVE-2015-6756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757">CVE-2015-6757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758">CVE-2015-6758</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759">CVE-2015-6759</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760">CVE-2015-6760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761">CVE-2015-6761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762">CVE-2015-6762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763">CVE-2015-6763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764">CVE-2015-6764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765">CVE-2015-6765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766">CVE-2015-6766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767">CVE-2015-6767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768">CVE-2015-6768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769">CVE-2015-6769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770">CVE-2015-6770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771">CVE-2015-6771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772">CVE-2015-6772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773">CVE-2015-6773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774">CVE-2015-6774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775">CVE-2015-6775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776">CVE-2015-6776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777">CVE-2015-6777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778">CVE-2015-6778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779">CVE-2015-6779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780">CVE-2015-6780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781">CVE-2015-6781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782">CVE-2015-6782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783">CVE-2015-6783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784">CVE-2015-6784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785">CVE-2015-6785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786">CVE-2015-6786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787">CVE-2015-6787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788">CVE-2015-6788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789">CVE-2015-6789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790">CVE-2015-6790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791">CVE-2015-6791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792">CVE-2015-6792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612">CVE-2016-1612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613">CVE-2016-1613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614">CVE-2016-1614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615">CVE-2016-1615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616">CVE-2016-1616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617">CVE-2016-1617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618">CVE-2016-1618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619">CVE-2016-1619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620">CVE-2016-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621">CVE-2016-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622">CVE-2016-1622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623">CVE-2016-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624">CVE-2016-1624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625">CVE-2016-1625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626">CVE-2016-1626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627">CVE-2016-1627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628">CVE-2016-1628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629">CVE-2016-1629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630">CVE-2016-1630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631">CVE-2016-1631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632">CVE-2016-1632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633">CVE-2016-1633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634">CVE-2016-1634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635">CVE-2016-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636">CVE-2016-1636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637">CVE-2016-1637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638">CVE-2016-1638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639">CVE-2016-1639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640">CVE-2016-1640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641">CVE-2016-1641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270">CVE-2015-1270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271">CVE-2015-1271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272">CVE-2015-1272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273">CVE-2015-1273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274">CVE-2015-1274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275">CVE-2015-1275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276">CVE-2015-1276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277">CVE-2015-1277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278">CVE-2015-1278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279">CVE-2015-1279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280">CVE-2015-1280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281">CVE-2015-1281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282">CVE-2015-1282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284">CVE-2015-1284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285">CVE-2015-1285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286">CVE-2015-1286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287">CVE-2015-1287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288">CVE-2015-1288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289">CVE-2015-1289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291">CVE-2015-1291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292">CVE-2015-1292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293">CVE-2015-1293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294">CVE-2015-1294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295">CVE-2015-1295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296">CVE-2015-1296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297">CVE-2015-1297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298">CVE-2015-1298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299">CVE-2015-1299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300">CVE-2015-1300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302">CVE-2015-1302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303">CVE-2015-1303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304">CVE-2015-1304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755">CVE-2015-6755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756">CVE-2015-6756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757">CVE-2015-6757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758">CVE-2015-6758</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759">CVE-2015-6759</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760">CVE-2015-6760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761">CVE-2015-6761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762">CVE-2015-6762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763">CVE-2015-6763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764">CVE-2015-6764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765">CVE-2015-6765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766">CVE-2015-6766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767">CVE-2015-6767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768">CVE-2015-6768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769">CVE-2015-6769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770">CVE-2015-6770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771">CVE-2015-6771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772">CVE-2015-6772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773">CVE-2015-6773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774">CVE-2015-6774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775">CVE-2015-6775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776">CVE-2015-6776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777">CVE-2015-6777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778">CVE-2015-6778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779">CVE-2015-6779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780">CVE-2015-6780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781">CVE-2015-6781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782">CVE-2015-6782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783">CVE-2015-6783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784">CVE-2015-6784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785">CVE-2015-6785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786">CVE-2015-6786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787">CVE-2015-6787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788">CVE-2015-6788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789">CVE-2015-6789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790">CVE-2015-6790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791">CVE-2015-6791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792">CVE-2015-6792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612">CVE-2016-1612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613">CVE-2016-1613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614">CVE-2016-1614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615">CVE-2016-1615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616">CVE-2016-1616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617">CVE-2016-1617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618">CVE-2016-1618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619">CVE-2016-1619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620">CVE-2016-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621">CVE-2016-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622">CVE-2016-1622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623">CVE-2016-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624">CVE-2016-1624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625">CVE-2016-1625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626">CVE-2016-1626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627">CVE-2016-1627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628">CVE-2016-1628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629">CVE-2016-1629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630">CVE-2016-1630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631">CVE-2016-1631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632">CVE-2016-1632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633">CVE-2016-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634">CVE-2016-1634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635">CVE-2016-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636">CVE-2016-1636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637">CVE-2016-1637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638">CVE-2016-1638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639">CVE-2016-1639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640">CVE-2016-1640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641">CVE-2016-1641</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Nov 2015 01:34:44 +0000">
+ <metadata tag="requester" timestamp="2015-11-03T01:34:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:10:56 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:10:56Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-10.xml b/glsa-201603-10.xml
index 60f735d5..a680da42 100644
--- a/glsa-201603-10.xml
+++ b/glsa-201603-10.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in QtGui allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 2</revised>
<bug>546174</bug>
<access>remote</access>
<affected>
@@ -53,12 +53,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1858">CVE-2015-1858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1859">CVE-2015-1859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1860">CVE-2015-1860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1858">CVE-2015-1858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1859">CVE-2015-1859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1860">CVE-2015-1860</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:00:23 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:00:23Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:25:16 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:25:16Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-11.xml b/glsa-201603-11.xml
index 7be2e078..5a20f623 100644
--- a/glsa-201603-11.xml
+++ b/glsa-201603-11.xml
@@ -6,9 +6,9 @@
software suites allowing remote attackers to remotely execute arbitrary
code, obtain information, and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>525472</bug>
<bug>540054</bug>
<bug>546678</bug>
@@ -65,97 +65,97 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0458">CVE-2015-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0459">CVE-2015-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0460">CVE-2015-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0469">CVE-2015-0469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0470">CVE-2015-0470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0477">CVE-2015-0477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0478">CVE-2015-0478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0480">CVE-2015-0480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0484">CVE-2015-0484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0486">CVE-2015-0486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0488">CVE-2015-0488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0491">CVE-2015-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0492">CVE-2015-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2619">CVE-2015-2619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2627">CVE-2015-2627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2637">CVE-2015-2637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2638">CVE-2015-2638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2659">CVE-2015-2659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2664">CVE-2015-2664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4729">CVE-2015-4729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4736">CVE-2015-4736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0458">CVE-2015-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0459">CVE-2015-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0460">CVE-2015-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0469">CVE-2015-0469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0470">CVE-2015-0470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0477">CVE-2015-0477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0478">CVE-2015-0478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0480">CVE-2015-0480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0484">CVE-2015-0484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0486">CVE-2015-0486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0488">CVE-2015-0488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0491">CVE-2015-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0492">CVE-2015-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2619">CVE-2015-2619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2627">CVE-2015-2627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2637">CVE-2015-2637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2638">CVE-2015-2638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2659">CVE-2015-2659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2664">CVE-2015-2664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4729">CVE-2015-4729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4736">CVE-2015-4736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jul 2015 12:38:49 +0000">
+ <metadata tag="requester" timestamp="2015-07-22T12:38:49Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:35:30 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:35:30Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-12.xml b/glsa-201603-12.xml
index 02adf0d4..5f05efe4 100644
--- a/glsa-201603-12.xml
+++ b/glsa-201603-12.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">flightgear, simgear</product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>426502</bug>
<bug>468106</bug>
<access>remote</access>
@@ -67,11 +67,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2090">CVE-2012-2090</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2091">CVE-2012-2091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2090">CVE-2012-2090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2091">CVE-2012-2091</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 May 2015 06:03:32 +0000">
+ <metadata tag="requester" timestamp="2015-05-16T06:03:32Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 23:11:04 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T23:11:04Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-13.xml b/glsa-201603-13.xml
index 03a3682c..412d0c41 100644
--- a/glsa-201603-13.xml
+++ b/glsa-201603-13.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libreSwan possibly
resulting in Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>550974</bug>
<bug>558692</bug>
<access>remote</access>
@@ -47,11 +47,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3204">CVE-2015-3204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3240">CVE-2015-3240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3204">CVE-2015-3204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3240">CVE-2015-3240</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:09:11 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:09:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 23:20:43 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T23:20:43Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-14.xml b/glsa-201603-14.xml
index 2778a8b2..18283c7a 100644
--- a/glsa-201603-14.xml
+++ b/glsa-201603-14.xml
@@ -6,9 +6,9 @@
attackers to affect confidentiality, integrity, and availability through
various vectors.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>April 19, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-04-19: 2</revised>
<bug>537940</bug>
<bug>559532</bug>
<bug>565842</bug>
@@ -84,54 +84,54 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4749">CVE-2015-4749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4749">CVE-2015-4749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 14:44:12 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Apr 2016 21:34:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-07-16T14:44:12Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-04-19T21:34:37Z">b-man</metadata>
</glsa>
diff --git a/glsa-201603-15.xml b/glsa-201603-15.xml
index f2f0afd6..e4cd7987 100644
--- a/glsa-201603-15.xml
+++ b/glsa-201603-15.xml
@@ -6,8 +6,8 @@
allowing remote attackers to decrypt TLS sessions.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 20, 2016</announced>
- <revised>March 20, 2016: 1</revised>
+ <announced>2016-03-20</announced>
+ <revised>2016-03-20: 1</revised>
<bug>575548</bug>
<access>remote</access>
<affected>
@@ -63,19 +63,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0702">CVE-2016-0702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0703">CVE-2016-0703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0704">CVE-2016-0704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0705">CVE-2016-0705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0797">CVE-2016-0797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0798">CVE-2016-0798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0799">CVE-2016-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0800">CVE-2016-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0702">CVE-2016-0702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0703">CVE-2016-0703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0704">CVE-2016-0704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0705">CVE-2016-0705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0797">CVE-2016-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0798">CVE-2016-0798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0799">CVE-2016-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0800">CVE-2016-0800</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Mar 2016 14:45:13 +0000">
+ <metadata tag="requester" timestamp="2016-03-01T14:45:13Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 13:46:37 +0000">
+ <metadata tag="submitter" timestamp="2016-03-20T13:46:37Z">
keytoaster
</metadata>
</glsa>
diff --git a/glsa-201604-01.xml b/glsa-201604-01.xml
index 568ca4e2..a22d9018 100644
--- a/glsa-201604-01.xml
+++ b/glsa-201604-01.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">QEMU</product>
- <announced>April 02, 2016</announced>
- <revised>April 02, 2016: 1</revised>
+ <announced>2016-04-02</announced>
+ <revised>2016-04-02: 1</revised>
<bug>569118</bug>
<bug>569300</bug>
<bug>571560</bug>
@@ -53,17 +53,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8613">CVE-2015-8613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8619">CVE-2015-8619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1714">CVE-2016-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1922">CVE-2016-1922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1981">CVE-2016-1981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2197">CVE-2016-2197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2198">CVE-2016-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2392">CVE-2016-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2538">CVE-2016-2538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2858">CVE-2016-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8613">CVE-2015-8613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8619">CVE-2015-8619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1714">CVE-2016-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1922">CVE-2016-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1981">CVE-2016-1981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2197">CVE-2016-2197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2198">CVE-2016-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2392">CVE-2016-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2538">CVE-2016-2538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2858">CVE-2016-2858</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2016 06:05:49 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Apr 2016 17:57:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-23T06:05:49Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-02T17:57:26Z">b-man</metadata>
</glsa>
diff --git a/glsa-201604-02.xml b/glsa-201604-02.xml
index e73c072d..a485d7a4 100644
--- a/glsa-201604-02.xml
+++ b/glsa-201604-02.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code and load arbitrary classes.
</synopsis>
<product type="ebuild">xalan-java</product>
- <announced>April 02, 2016</announced>
- <revised>April 02, 2016: 1</revised>
+ <announced>2016-04-02</announced>
+ <revised>2016-04-02: 1</revised>
<bug>505602</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0107">CVE-2014-0107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0107">CVE-2014-0107</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Mar 2016 11:55:40 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Apr 2016 19:42:25 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-04T11:55:40Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-02T19:42:25Z">b-man</metadata>
</glsa>
diff --git a/glsa-201604-03.xml b/glsa-201604-03.xml
index f593a0f5..d6730d0c 100644
--- a/glsa-201604-03.xml
+++ b/glsa-201604-03.xml
@@ -6,8 +6,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">xen</product>
- <announced>April 05, 2016</announced>
- <revised>April 05, 2016: 1</revised>
+ <announced>2016-04-05</announced>
+ <revised>2016-04-05: 1</revised>
<bug>445254</bug>
<bug>513832</bug>
<bug>547202</bug>
@@ -101,59 +101,59 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151">CVE-2015-2151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259">CVE-2015-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340">CVE-2015-3340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103">CVE-2015-4103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104">CVE-2015-4104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105">CVE-2015-4105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106">CVE-2015-4106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163">CVE-2015-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164">CVE-2015-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311">CVE-2015-7311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812">CVE-2015-7812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813">CVE-2015-7813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814">CVE-2015-7814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835">CVE-2015-7835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969">CVE-2015-7969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970">CVE-2015-7970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971">CVE-2015-7971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972">CVE-2015-7972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339">CVE-2015-8339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340">CVE-2015-8340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341">CVE-2015-8341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550">CVE-2015-8550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551">CVE-2015-8551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552">CVE-2015-8552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554">CVE-2015-8554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555">CVE-2015-8555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270">CVE-2016-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271">CVE-2016-2271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151">CVE-2015-2151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259">CVE-2015-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340">CVE-2015-3340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103">CVE-2015-4103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104">CVE-2015-4104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105">CVE-2015-4105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106">CVE-2015-4106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163">CVE-2015-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164">CVE-2015-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311">CVE-2015-7311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812">CVE-2015-7812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813">CVE-2015-7813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814">CVE-2015-7814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835">CVE-2015-7835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969">CVE-2015-7969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970">CVE-2015-7970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971">CVE-2015-7971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972">CVE-2015-7972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339">CVE-2015-8339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340">CVE-2015-8340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341">CVE-2015-8341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550">CVE-2015-8550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551">CVE-2015-8551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552">CVE-2015-8552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554">CVE-2015-8554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555">CVE-2015-8555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270">CVE-2016-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271">CVE-2016-2271</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 May 2015 19:20:02 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Apr 2016 06:39:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-14T19:20:02Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-04-05T06:39:26Z">b-man</metadata>
</glsa>
diff --git a/glsa-201604-04.xml b/glsa-201604-04.xml
index 0c61a70b..fa674db4 100644
--- a/glsa-201604-04.xml
+++ b/glsa-201604-04.xml
@@ -7,8 +7,8 @@
overflows.
</synopsis>
<product type="ebuild">libksba</product>
- <announced>April 26, 2016</announced>
- <revised>April 26, 2016: 1</revised>
+ <announced>2016-04-26</announced>
+ <revised>2016-04-26: 1</revised>
<bug>546464</bug>
<access>remote</access>
<affected>
@@ -53,8 +53,8 @@
Integer overflow in the DN decoder src/dn.c
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jul 2015 04:35:16 +0000">
+ <metadata tag="requester" timestamp="2015-07-06T04:35:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2016 21:22:11 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-26T21:22:11Z">b-man</metadata>
</glsa>
diff --git a/glsa-201604-05.xml b/glsa-201604-05.xml
index 52938018..9f206911 100644
--- a/glsa-201604-05.xml
+++ b/glsa-201604-05.xml
@@ -6,9 +6,9 @@
local attackers to escalate privileges and remote attackers to cause Denial
of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>April 26, 2016</announced>
- <revised>April 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-04-26</announced>
+ <revised>2016-04-26: 1</revised>
<bug>570564</bug>
<bug>575780</bug>
<access>local, remote</access>
@@ -43,51 +43,51 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8711">CVE-2015-8711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8712">CVE-2015-8712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8713">CVE-2015-8713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8714">CVE-2015-8714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8715">CVE-2015-8715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8716">CVE-2015-8716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8717">CVE-2015-8717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8718">CVE-2015-8718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8719">CVE-2015-8719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8720">CVE-2015-8720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8721">CVE-2015-8721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8722">CVE-2015-8722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8723">CVE-2015-8723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8724">CVE-2015-8724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8725">CVE-2015-8725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8726">CVE-2015-8726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8727">CVE-2015-8727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8728">CVE-2015-8728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8729">CVE-2015-8729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8730">CVE-2015-8730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8731">CVE-2015-8731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8732">CVE-2015-8732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8733">CVE-2015-8733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8734">CVE-2015-8734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8735">CVE-2015-8735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8736">CVE-2015-8736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8737">CVE-2015-8737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8738">CVE-2015-8738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8739">CVE-2015-8739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8740">CVE-2015-8740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8741">CVE-2015-8741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8742">CVE-2015-8742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2521">CVE-2016-2521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2522">CVE-2016-2522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2523">CVE-2016-2523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2524">CVE-2016-2524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2525">CVE-2016-2525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2526">CVE-2016-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2527">CVE-2016-2527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2528">CVE-2016-2528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2529">CVE-2016-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2530">CVE-2016-2530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2531">CVE-2016-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2532">CVE-2016-2532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8711">CVE-2015-8711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8712">CVE-2015-8712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8713">CVE-2015-8713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8714">CVE-2015-8714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8715">CVE-2015-8715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8716">CVE-2015-8716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8717">CVE-2015-8717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8718">CVE-2015-8718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8719">CVE-2015-8719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8720">CVE-2015-8720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8721">CVE-2015-8721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8722">CVE-2015-8722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8723">CVE-2015-8723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8724">CVE-2015-8724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8725">CVE-2015-8725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8726">CVE-2015-8726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8727">CVE-2015-8727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8728">CVE-2015-8728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8729">CVE-2015-8729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8730">CVE-2015-8730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8731">CVE-2015-8731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8732">CVE-2015-8732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8733">CVE-2015-8733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8734">CVE-2015-8734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8735">CVE-2015-8735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8736">CVE-2015-8736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8737">CVE-2015-8737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8738">CVE-2015-8738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8739">CVE-2015-8739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8740">CVE-2015-8740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8741">CVE-2015-8741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8742">CVE-2015-8742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2521">CVE-2016-2521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2522">CVE-2016-2522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2523">CVE-2016-2523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2524">CVE-2016-2524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2525">CVE-2016-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2526">CVE-2016-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2527">CVE-2016-2527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2528">CVE-2016-2528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2529">CVE-2016-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2530">CVE-2016-2530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2531">CVE-2016-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2532">CVE-2016-2532</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 10:26:18 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2016 21:26:43 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T10:26:18Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-26T21:26:43Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-01.xml b/glsa-201605-01.xml
index 343e5b0d..dfccde7c 100644
--- a/glsa-201605-01.xml
+++ b/glsa-201605-01.xml
@@ -5,9 +5,9 @@
<synopsis>Git contains multiple vulnerabilities that allow for the remote
execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 02, 2016</announced>
- <revised>May 02, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-02</announced>
+ <revised>2016-05-02: 1</revised>
<bug>562884</bug>
<bug>577482</bug>
<access>remote</access>
@@ -51,16 +51,16 @@
<uri link="http://seclists.org/oss-sec/2016/q1/645">Buffer overflow in all
git versions before 2.7.1
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7545">CVE-2015-7545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7545">CVE-2015-7545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315">
CVE-2016-2315
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324">
CVE-2016-2324
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 19:36:07 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T19:36:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 May 2016 19:28:17 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-02T19:28:17Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-02.xml b/glsa-201605-02.xml
index a2a670ed..48b35e68 100644
--- a/glsa-201605-02.xml
+++ b/glsa-201605-02.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 14, 2016</announced>
- <revised>May 14, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-14</announced>
+ <revised>2016-05-14: 1</revised>
<bug>578200</bug>
<bug>579954</bug>
<bug>581524</bug>
@@ -49,35 +49,35 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1646">CVE-2016-1646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1647">CVE-2016-1647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1648">CVE-2016-1648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1649">CVE-2016-1649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1650">CVE-2016-1650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1651">CVE-2016-1651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1652">CVE-2016-1652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1653">CVE-2016-1653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1654">CVE-2016-1654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1655">CVE-2016-1655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1656">CVE-2016-1656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1657">CVE-2016-1657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1658">CVE-2016-1658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1659">CVE-2016-1659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1660">CVE-2016-1660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1661">CVE-2016-1661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1662">CVE-2016-1662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1663">CVE-2016-1663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1664">CVE-2016-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1665">CVE-2016-1665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1666">CVE-2016-1666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1667 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1646">CVE-2016-1646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1647">CVE-2016-1647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1648">CVE-2016-1648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1649">CVE-2016-1649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1650">CVE-2016-1650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1651">CVE-2016-1651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1652">CVE-2016-1652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1653">CVE-2016-1653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1654">CVE-2016-1654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1655">CVE-2016-1655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1656">CVE-2016-1656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1657">CVE-2016-1657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1658">CVE-2016-1658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1659">CVE-2016-1659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1660">CVE-2016-1660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1661">CVE-2016-1661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1662">CVE-2016-1662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1663">CVE-2016-1663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1664">CVE-2016-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1665">CVE-2016-1665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1666">CVE-2016-1666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1667 ">
CVE-2016-1667
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1668">CVE-2016-1668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1669">CVE-2016-1669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1670">CVE-2016-1670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1671">CVE-2016-1671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1668">CVE-2016-1668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1669">CVE-2016-1669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1670">CVE-2016-1670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1671">CVE-2016-1671</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Mar 2016 04:54:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 May 2016 23:29:20 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-25T04:54:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-14T23:29:20Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-03.xml b/glsa-201605-03.xml
index d8be23eb..be29f33c 100644
--- a/glsa-201605-03.xml
+++ b/glsa-201605-03.xml
@@ -6,8 +6,8 @@
allows remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">libfpx</product>
- <announced>May 30, 2016</announced>
- <revised>May 30, 2016: 1</revised>
+ <announced>2016-05-30</announced>
+ <revised>2016-05-30: 1</revised>
<bug>395367</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025">CVE-2012-0025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025">CVE-2012-0025</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Apr 2016 23:28:31 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 May 2016 17:56:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-04-06T23:28:31Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-30T17:56:49Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-04.xml b/glsa-201605-04.xml
index b568f84a..50121768 100644
--- a/glsa-201605-04.xml
+++ b/glsa-201605-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in rsync, the worst of
which could allow remote attackers to write arbitrary files.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 30, 2016</announced>
- <revised>May 30, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-30</announced>
+ <revised>2016-05-30: 1</revised>
<bug>519108</bug>
<bug>540000</bug>
<bug>569140</bug>
@@ -41,11 +41,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8242">CVE-2014-8242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9512">CVE-2014-9512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8242">CVE-2014-8242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9512">CVE-2014-9512</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:39:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:39:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 May 2016 19:55:19 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-30T19:55:19Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-05.xml b/glsa-201605-05.xml
index f27dedd7..f8277fae 100644
--- a/glsa-201605-05.xml
+++ b/glsa-201605-05.xml
@@ -6,8 +6,8 @@
remote attackers to bypass the auth process and cause Denial of Service.
</synopsis>
<product type="ebuild">pam</product>
- <announced>May 31, 2016</announced>
- <revised>May 31, 2016: 1</revised>
+ <announced>2016-05-31</announced>
+ <revised>2016-05-31: 1</revised>
<bug>493432</bug>
<bug>505604</bug>
<bug>553302</bug>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7041">CVE-2013-7041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2583">CVE-2014-2583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7041">CVE-2013-7041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2583">CVE-2014-2583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 14:28:31 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T14:28:31Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 May 2016 04:26:13 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-31T04:26:13Z">b-man</metadata>
</glsa>
diff --git a/glsa-201605-06.xml b/glsa-201605-06.xml
index e456fb64..ae11c273 100644
--- a/glsa-201605-06.xml
+++ b/glsa-201605-06.xml
@@ -118,194 +118,194 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
</references>
<metadata tag="requester" timestamp="2015-12-31T02:35:40Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-01-20T18:11:38Z">b-man</metadata>
diff --git a/glsa-201606-01.xml b/glsa-201606-01.xml
index a06cdb60..fb5646bc 100644
--- a/glsa-201606-01.xml
+++ b/glsa-201606-01.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 2</revised>
<bug>565080</bug>
<bug>576524</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5309">CVE-2015-5309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2563">CVE-2016-2563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5309">CVE-2015-5309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2563">CVE-2016-2563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Apr 2016 03:16:59 +0000">
+ <metadata tag="requester" timestamp="2016-04-05T03:16:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 16:25:06 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T16:25:06Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-02.xml b/glsa-201606-02.xml
index c2d4bbc0..d3c9bf5c 100644
--- a/glsa-201606-02.xml
+++ b/glsa-201606-02.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Puppet Server and
Agent, the worst of which could lead to arbitrary code execution.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 3</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 3</revised>
<bug>577450</bug>
<bug>581372</bug>
<access>remote</access>
@@ -56,9 +56,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785">CVE-2016-2785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786">CVE-2016-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785">CVE-2016-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786">CVE-2016-2786</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 09:09:16 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 20:14:52 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T09:09:16Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T20:14:52Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-03.xml b/glsa-201606-03.xml
index 09e90db9..41a3ca82 100644
--- a/glsa-201606-03.xml
+++ b/glsa-201606-03.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 2</revised>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 2</revised>
<bug>491150</bug>
<bug>531418</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6630">CVE-2013-6630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6630">CVE-2013-6630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:00:52 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:00:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 19:54:52 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T19:54:52Z">mrueg</metadata>
</glsa>
diff --git a/glsa-201606-04.xml b/glsa-201606-04.xml
index c1a28955..b9ab5c44 100644
--- a/glsa-201606-04.xml
+++ b/glsa-201606-04.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>June 05, 2016</announced>
- <revised>June 10, 2016: 2</revised>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-10: 2</revised>
<bug>534110</bug>
<bug>541564</bug>
<bug>541568</bug>
@@ -69,11 +69,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Feb 2015 14:53:59 +0000">
+ <metadata tag="requester" timestamp="2015-02-16T14:53:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2016 18:09:58 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2016-06-10T18:09:58Z">stanley</metadata>
</glsa>
diff --git a/glsa-201606-05.xml b/glsa-201606-05.xml
index 057c5fd2..c83207b9 100644
--- a/glsa-201606-05.xml
+++ b/glsa-201606-05.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in spice, the worst of
which may result in the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 16, 2016</announced>
- <revised>June 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-16</announced>
+ <revised>2016-06-16: 1</revised>
<bug>560006</bug>
<bug>562890</bug>
<bug>584126</bug>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0749">CVE-2016-0749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2150">CVE-2016-2150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0749">CVE-2016-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2150">CVE-2016-2150</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Nov 2015 21:15:42 +0000">
+ <metadata tag="requester" timestamp="2015-11-18T21:15:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jun 2016 18:45:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-16T18:45:10Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-06.xml b/glsa-201606-06.xml
index a9cd5355..012478a9 100644
--- a/glsa-201606-06.xml
+++ b/glsa-201606-06.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in nginx, the worst of
which may allow a remote attacker to cause a Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 17, 2016</announced>
- <revised>June 17, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-17</announced>
+ <revised>2016-06-17: 1</revised>
<bug>560854</bug>
<bug>573046</bug>
<bug>584744</bug>
@@ -45,15 +45,15 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587">
CVE-2013-3587
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742">CVE-2016-0742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746">CVE-2016-0746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747">CVE-2016-0747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742">CVE-2016-0742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746">CVE-2016-0746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747">CVE-2016-0747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Jun 2016 08:44:21 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Jun 2016 18:26:31 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-14T08:44:21Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-17T18:26:31Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-07.xml b/glsa-201606-07.xml
index c589b40d..d17e4f6a 100644
--- a/glsa-201606-07.xml
+++ b/glsa-201606-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in dhcpcd allowing remote
attackers to possibly execute arbitrary code or cause a Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 2</revised>
<bug>571152</bug>
<access>remote</access>
<affected>
@@ -43,9 +43,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1503">CVE-2016-1503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1503">CVE-2016-1503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:32:46 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 19:11:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-08T20:32:46Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T19:11:50Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-08.xml b/glsa-201606-08.xml
index 8824cfd3..57de58c6 100644
--- a/glsa-201606-08.xml
+++ b/glsa-201606-08.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 1</revised>
<bug>579166</bug>
<bug>582670</bug>
<bug>586044</bug>
@@ -46,23 +46,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4121">CVE-2016-4121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4160">CVE-2016-4160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4161">CVE-2016-4161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4162">CVE-2016-4162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4163">CVE-2016-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4121">CVE-2016-4121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4160">CVE-2016-4160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4161">CVE-2016-4161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4162">CVE-2016-4162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4163">CVE-2016-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Jun 2016 23:30:46 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 23:47:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-17T23:30:46Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T23:47:05Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-09.xml b/glsa-201606-09.xml
index 46661c82..9da90fcc 100644
--- a/glsa-201606-09.xml
+++ b/glsa-201606-09.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution or Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 1</revised>
<bug>528554</bug>
<bug>553732</bug>
<bug>571868</bug>
@@ -47,16 +47,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9676">CVE-2014-9676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2213">CVE-2016-2213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2327">CVE-2016-2327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2328">CVE-2016-2328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2329">CVE-2016-2329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2330">CVE-2016-2330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9676">CVE-2014-9676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2213">CVE-2016-2213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2327">CVE-2016-2327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2328">CVE-2016-2328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2329">CVE-2016-2329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2330">CVE-2016-2330</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Mar 2016 12:22:08 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 23:58:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-20T12:22:08Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T23:58:49Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-10.xml b/glsa-201606-10.xml
index 16f5d40e..bc040e51 100644
--- a/glsa-201606-10.xml
+++ b/glsa-201606-10.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">php</product>
- <announced>June 19, 2016</announced>
- <revised>June 19, 2016: 2</revised>
+ <announced>2016-06-19</announced>
+ <revised>2016-06-19: 2</revised>
<bug>537586</bug>
<bug>541098</bug>
<bug>544186</bug>
@@ -80,41 +80,41 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501">CVE-2013-6501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705">CVE-2014-9705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709">CVE-2014-9709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273">CVE-2015-0273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351">CVE-2015-1351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352">CVE-2015-1352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301">CVE-2015-2301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348">CVE-2015-2348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783">CVE-2015-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787">CVE-2015-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329">CVE-2015-3329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330">CVE-2015-3330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021">CVE-2015-4021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022">CVE-2015-4022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025">CVE-2015-4025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026">CVE-2015-4026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147">CVE-2015-4147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148">CVE-2015-4148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642">CVE-2015-4642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643">CVE-2015-4643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644">CVE-2015-4644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831">CVE-2015-6831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832">CVE-2015-6832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833">CVE-2015-6833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834">CVE-2015-6834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835">CVE-2015-6835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836">CVE-2015-6836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837">CVE-2015-6837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838">CVE-2015-6838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803">CVE-2015-7803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804">CVE-2015-7804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501">CVE-2013-6501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705">CVE-2014-9705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709">CVE-2014-9709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273">CVE-2015-0273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351">CVE-2015-1351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352">CVE-2015-1352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301">CVE-2015-2301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348">CVE-2015-2348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783">CVE-2015-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787">CVE-2015-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329">CVE-2015-3329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330">CVE-2015-3330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021">CVE-2015-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022">CVE-2015-4022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025">CVE-2015-4025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026">CVE-2015-4026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147">CVE-2015-4147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148">CVE-2015-4148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642">CVE-2015-4642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643">CVE-2015-4643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644">CVE-2015-4644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831">CVE-2015-6831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832">CVE-2015-6832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833">CVE-2015-6833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834">CVE-2015-6834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835">CVE-2015-6835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836">CVE-2015-6836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837">CVE-2015-6837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838">CVE-2015-6838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803">CVE-2015-7803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804">CVE-2015-7804</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Apr 2015 22:36:42 +0000">
+ <metadata tag="requester" timestamp="2015-04-18T22:36:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jun 2016 21:29:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-19T21:29:10Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-11.xml b/glsa-201606-11.xml
index fbe5dfb4..6659a531 100644
--- a/glsa-201606-11.xml
+++ b/glsa-201606-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in claws-mail,
particularly in the default SSL implementation.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>525588</bug>
<bug>569010</bug>
<bug>570692</bug>
@@ -43,14 +43,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2016 06:27:10 +0000">
+ <metadata tag="requester" timestamp="2016-04-26T06:27:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 12:30:09 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T12:30:09Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-12.xml b/glsa-201606-12.xml
index 385fd4f8..a28afbb9 100644
--- a/glsa-201606-12.xml
+++ b/glsa-201606-12.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libssh and libssh2, the
worst of which allows remote attackers to cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>533366</bug>
<bug>575474</bug>
<bug>575484</bug>
@@ -67,12 +67,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8132">CVE-2014-8132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0739">CVE-2016-0739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0787">CVE-2016-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8132">CVE-2014-8132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0739">CVE-2016-0739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0787">CVE-2016-0787</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:23:55 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:23:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 12:56:59 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T12:56:59Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-13.xml b/glsa-201606-13.xml
index d4c5d26f..7872cea2 100644
--- a/glsa-201606-13.xml
+++ b/glsa-201606-13.xml
@@ -5,7 +5,7 @@
<synopsis>sudo is vulnerable to an escalation of privileges via a symlink
attack.
</synopsis>
- <product type="ebuild"></product>
+ <product type="ebuild"/>
<announced>2016-06-26</announced>
<revised>2017-04-17: 2</revised>
<bug>564774</bug>
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5602">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5602">
CVE-2015-5602
</uri>
</references>
diff --git a/glsa-201606-14.xml b/glsa-201606-14.xml
index 2969b238..3fea6158 100644
--- a/glsa-201606-14.xml
+++ b/glsa-201606-14.xml
@@ -6,8 +6,8 @@
overflows and possible Denials of Service.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>534106</bug>
<bug>562892</bug>
<access>remote</access>
@@ -60,8 +60,8 @@
Integer and Buffer overflow in coders/icon.c
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 17:37:18 +0000">
+ <metadata tag="requester" timestamp="2015-01-17T17:37:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 13:53:19 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T13:53:19Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-15.xml b/glsa-201606-15.xml
index 6360f808..cb918115 100644
--- a/glsa-201606-15.xml
+++ b/glsa-201606-15.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in FreeXL, allowing remote
attackers to executive arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>544426</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2753">CVE-2015-2753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2754">CVE-2015-2754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2776">CVE-2015-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2753">CVE-2015-2753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2754">CVE-2015-2754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2776">CVE-2015-2776</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Mar 2016 12:15:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 23:53:53 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-16T12:15:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T23:53:53Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-16.xml b/glsa-201606-16.xml
index 0e447938..5392a5a9 100644
--- a/glsa-201606-16.xml
+++ b/glsa-201606-16.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in PLIB might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>395553</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4620">CVE-2011-4620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4620">CVE-2011-4620</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 12:41:25 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 23:59:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T12:41:25Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T23:59:26Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-17.xml b/glsa-201606-17.xml
index 3884cf1e..fb537b33 100644
--- a/glsa-201606-17.xml
+++ b/glsa-201606-17.xml
@@ -7,8 +7,8 @@
cause Denial of Service.
</synopsis>
<product type="ebuild">wpa_supplicant</product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>524928</bug>
<bug>547492</bug>
<bug>548742</bug>
@@ -62,16 +62,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1863">CVE-2015-1863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4141">CVE-2015-4141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4142">CVE-2015-4142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4143">CVE-2015-4143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4144">CVE-2015-4144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4145">CVE-2015-4145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4146">CVE-2015-4146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1863">CVE-2015-1863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4141">CVE-2015-4141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4142">CVE-2015-4142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4143">CVE-2015-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4144">CVE-2015-4144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4145">CVE-2015-4145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4146">CVE-2015-4146</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Apr 2015 18:59:29 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 10:31:51 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-04-30T18:59:29Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T10:31:51Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-18.xml b/glsa-201606-18.xml
index 343d7bb0..5ff82f4c 100644
--- a/glsa-201606-18.xml
+++ b/glsa-201606-18.xml
@@ -6,9 +6,9 @@
attackers to affect confidentiality, integrity, and availability through
various vectors.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>578300</bug>
<bug>578788</bug>
<bug>581028</bug>
@@ -68,17 +68,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0686">CVE-2016-0686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0687">CVE-2016-0687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0695">CVE-2016-0695</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3422">CVE-2016-3422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3425">CVE-2016-3425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3427">CVE-2016-3427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3443">CVE-2016-3443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3449">CVE-2016-3449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0686">CVE-2016-0686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0687">CVE-2016-0687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0695">CVE-2016-0695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3422">CVE-2016-3422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3425">CVE-2016-3425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3427">CVE-2016-3427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3443">CVE-2016-3443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3449">CVE-2016-3449</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 25 Jun 2016 12:17:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 22:40:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-25T12:17:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T22:40:49Z">b-man</metadata>
</glsa>
diff --git a/glsa-201606-19.xml b/glsa-201606-19.xml
index 4bf0399f..4092b0fe 100644
--- a/glsa-201606-19.xml
+++ b/glsa-201606-19.xml
@@ -4,8 +4,8 @@
<title>kwalletd: Information disclosure</title>
<synopsis>Kwalletd password stores are vulnerable to codebook attacks.</synopsis>
<product type="ebuild">kwalletd</product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>496768</bug>
<access>local</access>
<affected>
@@ -40,8 +40,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7252">CVE-2013-7252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7252">CVE-2013-7252</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:07:07 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 22:45:32 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:07:07Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T22:45:32Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-01.xml b/glsa-201607-01.xml
index 14bd98ee..ec9197b4 100644
--- a/glsa-201607-01.xml
+++ b/glsa-201607-01.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 09, 2016</announced>
- <revised>July 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-09</announced>
+ <revised>2016-07-09: 1</revised>
<bug>536276</bug>
<bug>575542</bug>
<bug>578970</bug>
@@ -50,29 +50,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3947">CVE-2016-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3948">CVE-2016-3948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4051">CVE-2016-4051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4052">CVE-2016-4052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4053">CVE-2016-4053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4054">CVE-2016-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4553">CVE-2016-4553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4554">CVE-2016-4554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4555">CVE-2016-4555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4556">CVE-2016-4556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3947">CVE-2016-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3948">CVE-2016-3948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4051">CVE-2016-4051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4052">CVE-2016-4052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4053">CVE-2016-4053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4054">CVE-2016-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4553">CVE-2016-4553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4554">CVE-2016-4554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4555">CVE-2016-4555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4556">CVE-2016-4556</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Apr 2016 04:00:07 +0000">
+ <metadata tag="requester" timestamp="2016-04-05T04:00:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2016 01:46:31 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-09T01:46:31Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-02.xml b/glsa-201607-02.xml
index 3b1c38fe..00adac25 100644
--- a/glsa-201607-02.xml
+++ b/glsa-201607-02.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 09, 2016</announced>
- <revised>July 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-09</announced>
+ <revised>2016-07-09: 1</revised>
<bug>529952</bug>
<bug>551240</bug>
<bug>553300</bug>
@@ -48,31 +48,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8380">CVE-2015-8380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8381">CVE-2015-8381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8383">CVE-2015-8383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8384">CVE-2015-8384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8385">CVE-2015-8385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8386">CVE-2015-8386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8387">CVE-2015-8387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8388">CVE-2015-8388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8389">CVE-2015-8389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8390">CVE-2015-8390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8391">CVE-2015-8391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8392">CVE-2015-8392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8393">CVE-2015-8393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8394">CVE-2015-8394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8395">CVE-2015-8395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8380">CVE-2015-8380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8381">CVE-2015-8381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8383">CVE-2015-8383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8384">CVE-2015-8384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8385">CVE-2015-8385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8386">CVE-2015-8386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8387">CVE-2015-8387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8388">CVE-2015-8388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8389">CVE-2015-8389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8390">CVE-2015-8390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8391">CVE-2015-8391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8392">CVE-2015-8392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8393">CVE-2015-8393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8394">CVE-2015-8394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8395">CVE-2015-8395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 06:59:58 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T06:59:58Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2016 02:07:37 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-09T02:07:37Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-03.xml b/glsa-201607-03.xml
index ee94c2ca..3c6929bd 100644
--- a/glsa-201607-03.xml
+++ b/glsa-201607-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 13, 2016</announced>
- <revised>July 13, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-13</announced>
+ <revised>2016-07-13: 2</revised>
<bug>588738</bug>
<access>remote</access>
<affected>
@@ -44,40 +44,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4217">CVE-2016-4217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4218">CVE-2016-4218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4219">CVE-2016-4219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4220">CVE-2016-4220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4221">CVE-2016-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4222">CVE-2016-4222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4223">CVE-2016-4223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4224">CVE-2016-4224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4225">CVE-2016-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4226">CVE-2016-4226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4227">CVE-2016-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4228">CVE-2016-4228</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4229">CVE-2016-4229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4230">CVE-2016-4230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4231">CVE-2016-4231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4232">CVE-2016-4232</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4233">CVE-2016-4233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4234">CVE-2016-4234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4235">CVE-2016-4235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4236">CVE-2016-4236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4237">CVE-2016-4237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4238">CVE-2016-4238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4239">CVE-2016-4239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4240">CVE-2016-4240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4241">CVE-2016-4241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4242">CVE-2016-4242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4243">CVE-2016-4243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4244">CVE-2016-4244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4245">CVE-2016-4245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4246">CVE-2016-4246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4247">CVE-2016-4247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4248">CVE-2016-4248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4249">CVE-2016-4249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4217">CVE-2016-4217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4218">CVE-2016-4218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4219">CVE-2016-4219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4220">CVE-2016-4220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4221">CVE-2016-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4222">CVE-2016-4222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4223">CVE-2016-4223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4224">CVE-2016-4224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4225">CVE-2016-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4226">CVE-2016-4226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4227">CVE-2016-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4228">CVE-2016-4228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4229">CVE-2016-4229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4230">CVE-2016-4230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4231">CVE-2016-4231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4232">CVE-2016-4232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4233">CVE-2016-4233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4234">CVE-2016-4234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4235">CVE-2016-4235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4236">CVE-2016-4236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4237">CVE-2016-4237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4238">CVE-2016-4238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4239">CVE-2016-4239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4240">CVE-2016-4240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4241">CVE-2016-4241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4242">CVE-2016-4242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4243">CVE-2016-4243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4244">CVE-2016-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4245">CVE-2016-4245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4246">CVE-2016-4246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4247">CVE-2016-4247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4248">CVE-2016-4248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4249">CVE-2016-4249</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Jul 2016 18:15:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Jul 2016 18:55:55 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-13T18:15:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-13T18:55:55Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-04.xml b/glsa-201607-04.xml
index f52915c3..fcd734f2 100644
--- a/glsa-201607-04.xml
+++ b/glsa-201607-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in GD, the worst of which
allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>504872</bug>
<bug>538686</bug>
<bug>581942</bug>
@@ -43,16 +43,16 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2497">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2497">
CVE-2014-2497
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709">
CVE-2014-9709
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:19:37 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:19:37Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:08:00 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:08:00Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-05.xml b/glsa-201607-05.xml
index c5c22623..64da8591 100644
--- a/glsa-201607-05.xml
+++ b/glsa-201607-05.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>519900</bug>
<bug>568400</bug>
<bug>570984</bug>
@@ -46,17 +46,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5261">CVE-2014-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5262">CVE-2014-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8369">CVE-2015-8369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8377">CVE-2015-8377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8604">CVE-2015-8604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2313">CVE-2016-2313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3172">CVE-2016-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3659">CVE-2016-3659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5261">CVE-2014-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5262">CVE-2014-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8369">CVE-2015-8369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8377">CVE-2015-8377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8604">CVE-2015-8604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2313">CVE-2016-2313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3172">CVE-2016-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3659">CVE-2016-3659</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2016 06:10:39 +0000">
+ <metadata tag="requester" timestamp="2016-04-26T06:10:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:14:38 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:14:38Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-06.xml b/glsa-201607-06.xml
index ece3869d..c6d4cce2 100644
--- a/glsa-201607-06.xml
+++ b/glsa-201607-06.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in CUPS might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>539582</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9679">CVE-2014-9679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9679">CVE-2014-9679</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2016 05:48:13 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:19:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-01T05:48:13Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:19:26Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-07.xml b/glsa-201607-07.xml
index ba6017d1..b1b43937 100644
--- a/glsa-201607-07.xml
+++ b/glsa-201607-07.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>584310</bug>
<bug>586704</bug>
<access>remote</access>
@@ -47,31 +47,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1672">CVE-2016-1672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1673">CVE-2016-1673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1674">CVE-2016-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1675">CVE-2016-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1676">CVE-2016-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1677">CVE-2016-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1678">CVE-2016-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1679">CVE-2016-1679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1680">CVE-2016-1680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1681">CVE-2016-1681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1682">CVE-2016-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1683">CVE-2016-1683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1684">CVE-2016-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1685">CVE-2016-1685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1686">CVE-2016-1686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1687">CVE-2016-1687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1688">CVE-2016-1688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1689">CVE-2016-1689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1690">CVE-2016-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1691">CVE-2016-1691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1692">CVE-2016-1692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1693">CVE-2016-1693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1694">CVE-2016-1694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1695">CVE-2016-1695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1672">CVE-2016-1672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1673">CVE-2016-1673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1674">CVE-2016-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1675">CVE-2016-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1676">CVE-2016-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1677">CVE-2016-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1678">CVE-2016-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1679">CVE-2016-1679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1680">CVE-2016-1680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1681">CVE-2016-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1682">CVE-2016-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1683">CVE-2016-1683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1684">CVE-2016-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1685">CVE-2016-1685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1686">CVE-2016-1686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1687">CVE-2016-1687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1688">CVE-2016-1688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1689">CVE-2016-1689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1690">CVE-2016-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1691">CVE-2016-1691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1692">CVE-2016-1692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1693">CVE-2016-1693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1694">CVE-2016-1694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1695">CVE-2016-1695</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jun 2016 11:53:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:23:11 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-22T11:53:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:23:11Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-08.xml b/glsa-201607-08.xml
index 144c5e53..635491a7 100644
--- a/glsa-201607-08.xml
+++ b/glsa-201607-08.xml
@@ -5,9 +5,9 @@
<synopsis>A vulnerability has been found in Dropbear, which allows remote
authenticated users to bypass intended shell-command restrictions.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>577050</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3116">CVE-2016-3116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3116">CVE-2016-3116</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2016 05:13:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 08:45:10 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-21T05:13:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T08:45:10Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-09.xml b/glsa-201607-09.xml
index 214bff4b..b772c03d 100644
--- a/glsa-201607-09.xml
+++ b/glsa-201607-09.xml
@@ -6,8 +6,8 @@
property, which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">commons-beanutils</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>534498</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114">CVE-2014-0114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114">CVE-2014-0114</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Sep 2015 19:30:11 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 08:50:29 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-09-05T19:30:11Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T08:50:29Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-10.xml b/glsa-201607-10.xml
index d3640d89..28fc94c6 100644
--- a/glsa-201607-10.xml
+++ b/glsa-201607-10.xml
@@ -5,9 +5,9 @@
<synopsis>Improper input validation in Varnish allows remote attackers to
conduct HTTP smuggling attacks, and possibly trigger a buffer overflow.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>542886</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8852">CVE-2015-8852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8852">CVE-2015-8852</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jul 2016 01:59:09 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 09:01:06 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-02T01:59:09Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T09:01:06Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-11.xml b/glsa-201607-11.xml
index 66a4c091..7b8c6f10 100644
--- a/glsa-201607-11.xml
+++ b/glsa-201607-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Bugzilla, the worst of
which could lead to the escalation of privileges.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>524316</bug>
<bug>537448</bug>
<bug>560406</bug>
@@ -53,16 +53,16 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1572">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1572">
CVE-2014-1572
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1573">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1573">
CVE-2014-1573
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8630">CVE-2014-8630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8630">CVE-2014-8630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 05:32:55 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T05:32:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:12:25 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:12:25Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-12.xml b/glsa-201607-12.xml
index a8ba395b..2106141c 100644
--- a/glsa-201607-12.xml
+++ b/glsa-201607-12.xml
@@ -6,8 +6,8 @@
unsanitized data to a data source or escalate privileges.
</synopsis>
<product type="ebuild">exim</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>517934</bug>
<bug>576582</bug>
<access>local</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2972">CVE-2014-2972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2972">CVE-2014-2972</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Mar 2015 20:38:10 +0000">
+ <metadata tag="requester" timestamp="2015-03-28T20:38:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:18:46 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:18:46Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-13.xml b/glsa-201607-13.xml
index 5ac0fc44..6e8193cf 100644
--- a/glsa-201607-13.xml
+++ b/glsa-201607-13.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in libbsd might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>573160</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090">CVE-2016-2090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090">CVE-2016-2090</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 13:08:02 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:20:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T13:08:02Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:20:49Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-14.xml b/glsa-201607-14.xml
index cf90babd..0698d5a0 100644
--- a/glsa-201607-14.xml
+++ b/glsa-201607-14.xml
@@ -6,8 +6,8 @@
escalated privileges or write arbitrary files.
</synopsis>
<product type="ebuild">ansible</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 2</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 2</revised>
<bug>578814</bug>
<access>local</access>
<affected>
@@ -50,8 +50,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096">CVE-2016-3096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096">CVE-2016-3096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 25 Jun 2016 23:46:35 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:34:27 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2016-06-25T23:46:35Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:34:27Z">ackle</metadata>
</glsa>
diff --git a/glsa-201607-15.xml b/glsa-201607-15.xml
index 41bcc4b8..62f1f950 100644
--- a/glsa-201607-15.xml
+++ b/glsa-201607-15.xml
@@ -6,8 +6,8 @@
could lead to Denial of Service.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>563774</bug>
<bug>572452</bug>
<bug>581528</bug>
@@ -42,50 +42,50 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691">CVE-2015-7691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692">CVE-2015-7692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701">CVE-2015-7701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702">CVE-2015-7702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703">CVE-2015-7703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704">CVE-2015-7704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705">CVE-2015-7705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848">CVE-2015-7848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849">CVE-2015-7849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850">CVE-2015-7850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851">CVE-2015-7851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852">CVE-2015-7852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853">CVE-2015-7853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854">CVE-2015-7854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855">CVE-2015-7855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973">CVE-2015-7973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974">CVE-2015-7974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975">CVE-2015-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976">CVE-2015-7976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977">CVE-2015-7977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978">CVE-2015-7978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979">CVE-2015-7979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138">CVE-2015-8138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139">CVE-2015-8139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140">CVE-2015-8140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158">CVE-2015-8158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547">CVE-2016-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548">CVE-2016-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549">CVE-2016-1549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550">CVE-2016-1550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551">CVE-2016-1551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516">CVE-2016-2516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517">CVE-2016-2517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518">CVE-2016-2518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519">CVE-2016-2519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953">CVE-2016-4953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954">CVE-2016-4954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955">CVE-2016-4955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956">CVE-2016-4956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957">CVE-2016-4957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691">CVE-2015-7691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692">CVE-2015-7692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701">CVE-2015-7701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702">CVE-2015-7702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703">CVE-2015-7703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704">CVE-2015-7704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705">CVE-2015-7705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848">CVE-2015-7848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849">CVE-2015-7849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850">CVE-2015-7850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851">CVE-2015-7851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852">CVE-2015-7852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853">CVE-2015-7853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854">CVE-2015-7854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855">CVE-2015-7855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973">CVE-2015-7973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974">CVE-2015-7974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975">CVE-2015-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976">CVE-2015-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977">CVE-2015-7977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978">CVE-2015-7978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979">CVE-2015-7979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138">CVE-2015-8138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139">CVE-2015-8139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140">CVE-2015-8140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158">CVE-2015-8158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547">CVE-2016-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548">CVE-2016-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549">CVE-2016-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550">CVE-2016-1550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551">CVE-2016-1551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516">CVE-2016-2516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517">CVE-2016-2517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518">CVE-2016-2518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519">CVE-2016-2519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953">CVE-2016-4953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954">CVE-2016-4954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955">CVE-2016-4955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956">CVE-2016-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957">CVE-2016-4957</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:28:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:50:31 +0000">
+ <metadata tag="requester" timestamp="2016-02-08T20:28:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:50:31Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201607-16.xml b/glsa-201607-16.xml
index 1bfeb7b3..422afe53 100644
--- a/glsa-201607-16.xml
+++ b/glsa-201607-16.xml
@@ -3,9 +3,9 @@
<glsa id="201607-16">
<title>arpwatch: Privilege escalation</title>
<synopsis>arpwatch is vulnerable to the escalation of privileges.</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>419375</bug>
<access>local, remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2653">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2653">
CVE-2012-2653
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 12:49:20 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 12:02:59 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T12:49:20Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T12:02:59Z">b-man</metadata>
</glsa>
diff --git a/glsa-201607-17.xml b/glsa-201607-17.xml
index 9608edf5..2a41ef94 100644
--- a/glsa-201607-17.xml
+++ b/glsa-201607-17.xml
@@ -5,9 +5,9 @@
<synopsis>BeanShell is vulnerable to the remote execution of arbitrary code
via Java serialization or XStream from an untrusted source.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 30, 2016</announced>
- <revised>July 30, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-30</announced>
+ <revised>2016-07-30: 1</revised>
<bug>575482</bug>
<access>remote</access>
<affected>
@@ -49,6 +49,6 @@
CVE-2016-2510
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 10:56:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2016 00:53:17 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T10:56:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-30T00:53:17Z">b-man</metadata>
</glsa>
diff --git a/glsa-201608-01.xml b/glsa-201608-01.xml
index f4c378ca..91a1ebee 100644
--- a/glsa-201608-01.xml
+++ b/glsa-201608-01.xml
@@ -6,9 +6,9 @@
which could lead to the remote execution of arbitrary code, or cause a
Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>August 11, 2016</announced>
- <revised>August 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-08-11</announced>
+ <revised>2016-08-11: 1</revised>
<bug>561882</bug>
<bug>579030</bug>
<access>remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2191">CVE-2016-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3981">CVE-2016-3981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3982">CVE-2016-3982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2191">CVE-2016-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3981">CVE-2016-3981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3982">CVE-2016-3982</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Jun 2016 12:03:00 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Aug 2016 06:06:28 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-26T12:03:00Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-08-11T06:06:28Z">b-man</metadata>
</glsa>
diff --git a/glsa-201609-01.xml b/glsa-201609-01.xml
index 6f4c6eea..93366629 100644
--- a/glsa-201609-01.xml
+++ b/glsa-201609-01.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>September 25, 2016</announced>
- <revised>September 26, 2016: 2</revised>
+ <announced>2016-09-25</announced>
+ <revised>2016-09-26: 2</revised>
<bug>573816</bug>
<bug>579734</bug>
<bug>580040</bug>
@@ -67,32 +67,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2841">CVE-2016-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4001">CVE-2016-4001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4002">CVE-2016-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4020">CVE-2016-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4439">CVE-2016-4439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4441">CVE-2016-4441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4453">CVE-2016-4453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4454">CVE-2016-4454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4964">CVE-2016-4964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5106">CVE-2016-5106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5107">CVE-2016-5107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5126">CVE-2016-5126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5238">CVE-2016-5238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5337">CVE-2016-5337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5338">CVE-2016-5338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6490">CVE-2016-6490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6833">CVE-2016-6833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6834">CVE-2016-6834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6836">CVE-2016-6836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6888">CVE-2016-6888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7116">CVE-2016-7116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7156">CVE-2016-7156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7157">CVE-2016-7157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7421">CVE-2016-7421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7422">CVE-2016-7422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2841">CVE-2016-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4001">CVE-2016-4001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4002">CVE-2016-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4020">CVE-2016-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4439">CVE-2016-4439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4441">CVE-2016-4441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4453">CVE-2016-4453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4454">CVE-2016-4454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4964">CVE-2016-4964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5106">CVE-2016-5106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5107">CVE-2016-5107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5126">CVE-2016-5126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5238">CVE-2016-5238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5337">CVE-2016-5337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5338">CVE-2016-5338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6490">CVE-2016-6490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6833">CVE-2016-6833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6834">CVE-2016-6834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6836">CVE-2016-6836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6888">CVE-2016-6888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7116">CVE-2016-7116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7156">CVE-2016-7156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7157">CVE-2016-7157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7421">CVE-2016-7421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7422">CVE-2016-7422</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2016 00:30:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2016 00:34:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-01T00:30:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-09-26T00:34:50Z">b-man</metadata>
</glsa>
diff --git a/glsa-201609-02.xml b/glsa-201609-02.xml
index 6478422b..397ea52a 100644
--- a/glsa-201609-02.xml
+++ b/glsa-201609-02.xml
@@ -6,8 +6,8 @@
arbitrary code via the gem installation process.
</synopsis>
<product type="ebuild">bundler</product>
- <announced>September 26, 2016</announced>
- <revised>September 26, 2016: 1</revised>
+ <announced>2016-09-26</announced>
+ <revised>2016-09-26: 1</revised>
<bug>523798</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0334">CVE-2013-0334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0334">CVE-2013-0334</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Jan 2015 22:12:51 +0000">
+ <metadata tag="requester" timestamp="2015-01-31T22:12:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2016 04:04:29 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-09-26T04:04:29Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-01.xml b/glsa-201610-01.xml
index c7907aba..3cc08c16 100644
--- a/glsa-201610-01.xml
+++ b/glsa-201610-01.xml
@@ -6,8 +6,8 @@
java serialization is used.
</synopsis>
<product type="ebuild">groovy</product>
- <announced>October 06, 2016</announced>
- <revised>October 06, 2016: 1</revised>
+ <announced>2016-10-06</announced>
+ <revised>2016-10-06: 1</revised>
<bug>555470</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3253">CVE-2015-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3253">CVE-2015-3253</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 09:21:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Oct 2016 14:32:23 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T09:21:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-06T14:32:23Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-02.xml b/glsa-201610-02.xml
index f8918444..704998ea 100644
--- a/glsa-201610-02.xml
+++ b/glsa-201610-02.xml
@@ -6,9 +6,9 @@
which could allow HTTP request smuggling attacks or a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 06, 2016</announced>
- <revised>October 13, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-06</announced>
+ <revised>2016-10-13: 2</revised>
<bug>524680</bug>
<bug>536684</bug>
<bug>554948</bug>
@@ -50,13 +50,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3581">CVE-2014-3581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3183">CVE-2015-3183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1546">CVE-2016-1546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4979">CVE-2016-4979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3581">CVE-2014-3581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3183">CVE-2015-3183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1546">CVE-2016-1546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4979">CVE-2016-4979</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Sep 2015 13:17:03 +0000">
+ <metadata tag="requester" timestamp="2015-09-13T13:17:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Oct 2016 07:21:58 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-13T07:21:58Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-03.xml b/glsa-201610-03.xml
index 0689a541..86ff1c66 100644
--- a/glsa-201610-03.xml
+++ b/glsa-201610-03.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>October 10, 2016</announced>
- <revised>October 10, 2016: 1</revised>
+ <announced>2016-10-10</announced>
+ <revised>2016-10-10: 1</revised>
<bug>577156</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2342">CVE-2016-2342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2342">CVE-2016-2342</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Oct 2016 14:23:47 +0000">
+ <metadata tag="requester" timestamp="2016-10-06T14:23:47Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2016 08:11:56 +0000">
+ <metadata tag="submitter" timestamp="2016-10-10T08:11:56Z">
pinkbyte
</metadata>
</glsa>
diff --git a/glsa-201610-04.xml b/glsa-201610-04.xml
index d3d4aee4..a98a2c72 100644
--- a/glsa-201610-04.xml
+++ b/glsa-201610-04.xml
@@ -6,8 +6,8 @@
which results in predictable output from the random number generator.
</synopsis>
<product type="ebuild">libgcrypt</product>
- <announced>October 10, 2016</announced>
- <revised>October 10, 2016: 1</revised>
+ <announced>2016-10-10</announced>
+ <revised>2016-10-10: 1</revised>
<bug>541564</bug>
<bug>559942</bug>
<bug>574268</bug>
@@ -49,16 +49,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7511">CVE-2015-7511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7511">CVE-2015-7511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
<uri link="https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/">
Factoring RSA Keys With TLS Perfect Forward Secrecy
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Dec 2015 21:25:17 +0000">
+ <metadata tag="requester" timestamp="2015-12-02T21:25:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2016 11:04:11 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-10-10T11:04:11Z">K_F</metadata>
</glsa>
diff --git a/glsa-201610-05.xml b/glsa-201610-05.xml
index ecd5b43e..c81a3a4e 100644
--- a/glsa-201610-05.xml
+++ b/glsa-201610-05.xml
@@ -6,8 +6,8 @@
the worst of which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">subversion serf</product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 2</revised>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 2</revised>
<bug>500482</bug>
<bug>518716</bug>
<bug>519202</bug>
@@ -71,19 +71,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032">CVE-2014-0032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504">CVE-2014-3504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522">CVE-2014-3522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528">CVE-2014-3528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202">CVE-2015-0202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248">CVE-2015-0248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251">CVE-2015-0251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184">CVE-2015-3184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187">CVE-2015-3187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259">CVE-2015-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167">CVE-2016-2167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168">CVE-2016-2168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032">CVE-2014-0032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504">CVE-2014-3504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522">CVE-2014-3522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528">CVE-2014-3528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202">CVE-2015-0202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248">CVE-2015-0248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251">CVE-2015-0251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184">CVE-2015-3184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187">CVE-2015-3187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259">CVE-2015-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167">CVE-2016-2167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168">CVE-2016-2168</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:09:05 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 12:44:03 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:09:05Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T12:44:03Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-06.xml b/glsa-201610-06.xml
index 1054eaa8..0d6055b5 100644
--- a/glsa-201610-06.xml
+++ b/glsa-201610-06.xml
@@ -6,9 +6,9 @@
worst of which could allow remote attackers to cause a Denial of Service
condition or obtain sensitive information.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 1</revised>
<bug>546724</bug>
<bug>555478</bug>
<bug>555480</bug>
@@ -69,26 +69,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2582">CVE-2015-2582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2611">CVE-2015-2611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2617">CVE-2015-2617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2620">CVE-2015-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2639">CVE-2015-2639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2641">CVE-2015-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2643">CVE-2015-2643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2648">CVE-2015-2648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2661">CVE-2015-2661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4737">CVE-2015-4737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4752">CVE-2015-4752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4756">CVE-2015-4756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4757">CVE-2015-4757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4767">CVE-2015-4767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4769">CVE-2015-4769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4771">CVE-2015-4771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4772">CVE-2015-4772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2582">CVE-2015-2582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2611">CVE-2015-2611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2617">CVE-2015-2617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2620">CVE-2015-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2639">CVE-2015-2639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2641">CVE-2015-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2643">CVE-2015-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2648">CVE-2015-2648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2661">CVE-2015-2661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4737">CVE-2015-4737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4752">CVE-2015-4752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4756">CVE-2015-4756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4757">CVE-2015-4757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4767">CVE-2015-4767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4769">CVE-2015-4769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4771">CVE-2015-4771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4772">CVE-2015-4772</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:19:51 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:19:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 13:42:31 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T13:42:31Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-07.xml b/glsa-201610-07.xml
index 0af9c589..42afd62a 100644
--- a/glsa-201610-07.xml
+++ b/glsa-201610-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in BIND, the worst of
which could cause a Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 1</revised>
<bug>572414</bug>
<bug>576902</bug>
<bug>588652</bug>
@@ -45,15 +45,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8704">CVE-2015-8704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8705">CVE-2015-8705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1285">CVE-2016-1285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1286">CVE-2016-1286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2088">CVE-2016-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2775">CVE-2016-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2776">CVE-2016-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6170">CVE-2016-6170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8704">CVE-2015-8704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8705">CVE-2015-8705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1285">CVE-2016-1285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1286">CVE-2016-1286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2088">CVE-2016-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2775">CVE-2016-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2776">CVE-2016-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6170">CVE-2016-6170</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2016 10:56:46 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 18:53:41 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2016-07-11T10:56:46Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T18:53:41Z">Zlogene</metadata>
</glsa>
diff --git a/glsa-201610-08.xml b/glsa-201610-08.xml
index 6bc3904e..a4192169 100644
--- a/glsa-201610-08.xml
+++ b/glsa-201610-08.xml
@@ -7,8 +7,8 @@
code, obtain information, and cause Denial of Service.
</synopsis>
<product type="ebuild">java</product>
- <announced>October 15, 2016</announced>
- <revised>October 15, 2016: 1</revised>
+ <announced>2016-10-15</announced>
+ <revised>2016-10-15: 1</revised>
<bug>578160</bug>
<bug>580608</bug>
<bug>589208</bug>
@@ -60,29 +60,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0475">CVE-2016-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0603">CVE-2016-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3426">CVE-2016-3426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3498">CVE-2016-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3503">CVE-2016-3503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3511">CVE-2016-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3552">CVE-2016-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0475">CVE-2016-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0603">CVE-2016-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3426">CVE-2016-3426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3498">CVE-2016-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3503">CVE-2016-3503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3511">CVE-2016-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3552">CVE-2016-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Jul 2016 10:37:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2016 12:16:10 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-16T10:37:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-15T12:16:10Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-09.xml b/glsa-201610-09.xml
index 1aba37c2..2a41c47f 100644
--- a/glsa-201610-09.xml
+++ b/glsa-201610-09.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>October 29, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-10-29: 1</revised>
<bug>589278</bug>
<bug>590420</bug>
<bug>592630</bug>
@@ -51,72 +51,72 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127">CVE-2016-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128">CVE-2016-5128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129">CVE-2016-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130">CVE-2016-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132">CVE-2016-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133">CVE-2016-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134">CVE-2016-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135">CVE-2016-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136">CVE-2016-5136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137">CVE-2016-5137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138">CVE-2016-5138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139">CVE-2016-5139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140">CVE-2016-5140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141">CVE-2016-5141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142">CVE-2016-5142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143">CVE-2016-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144">CVE-2016-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145">CVE-2016-5145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146">CVE-2016-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147">CVE-2016-5147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148">CVE-2016-5148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149">CVE-2016-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150">CVE-2016-5150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151">CVE-2016-5151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152">CVE-2016-5152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153">CVE-2016-5153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154">CVE-2016-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155">CVE-2016-5155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156">CVE-2016-5156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157">CVE-2016-5157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158">CVE-2016-5158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159">CVE-2016-5159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160">CVE-2016-5160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161">CVE-2016-5161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162">CVE-2016-5162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163">CVE-2016-5163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164">CVE-2016-5164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165">CVE-2016-5165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166">CVE-2016-5166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167">CVE-2016-5167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170">CVE-2016-5170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171">CVE-2016-5171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172">CVE-2016-5172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173">CVE-2016-5173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174">CVE-2016-5174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175">CVE-2016-5175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177">CVE-2016-5177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178">CVE-2016-5178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181">CVE-2016-5181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182">CVE-2016-5182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183">CVE-2016-5183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184">CVE-2016-5184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185">CVE-2016-5185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186">CVE-2016-5186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187">CVE-2016-5187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188">CVE-2016-5188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189">CVE-2016-5189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190">CVE-2016-5190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191">CVE-2016-5191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192">CVE-2016-5192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193">CVE-2016-5193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194">CVE-2016-5194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127">CVE-2016-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128">CVE-2016-5128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129">CVE-2016-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130">CVE-2016-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132">CVE-2016-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133">CVE-2016-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134">CVE-2016-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135">CVE-2016-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136">CVE-2016-5136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137">CVE-2016-5137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138">CVE-2016-5138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139">CVE-2016-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140">CVE-2016-5140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141">CVE-2016-5141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142">CVE-2016-5142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143">CVE-2016-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144">CVE-2016-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145">CVE-2016-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146">CVE-2016-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147">CVE-2016-5147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148">CVE-2016-5148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149">CVE-2016-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150">CVE-2016-5150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151">CVE-2016-5151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152">CVE-2016-5152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153">CVE-2016-5153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154">CVE-2016-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155">CVE-2016-5155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156">CVE-2016-5156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157">CVE-2016-5157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158">CVE-2016-5158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159">CVE-2016-5159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160">CVE-2016-5160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161">CVE-2016-5161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162">CVE-2016-5162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163">CVE-2016-5163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164">CVE-2016-5164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165">CVE-2016-5165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166">CVE-2016-5166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167">CVE-2016-5167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170">CVE-2016-5170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171">CVE-2016-5171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172">CVE-2016-5172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173">CVE-2016-5173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174">CVE-2016-5174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175">CVE-2016-5175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177">CVE-2016-5177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178">CVE-2016-5178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181">CVE-2016-5181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182">CVE-2016-5182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183">CVE-2016-5183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184">CVE-2016-5184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185">CVE-2016-5185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186">CVE-2016-5186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187">CVE-2016-5187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188">CVE-2016-5188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189">CVE-2016-5189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190">CVE-2016-5190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191">CVE-2016-5191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192">CVE-2016-5192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193">CVE-2016-5193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194">CVE-2016-5194</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Sep 2016 13:43:22 +0000">
+ <metadata tag="requester" timestamp="2016-09-08T13:43:22Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Oct 2016 13:09:39 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-29T13:09:39Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-10.xml b/glsa-201610-10.xml
index 693f22fc..50a2526f 100644
--- a/glsa-201610-10.xml
+++ b/glsa-201610-10.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>November 01, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-11-01: 2</revised>
<bug>593684</bug>
<bug>596896</bug>
<bug>598152</bug>
@@ -59,49 +59,49 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182">CVE-2016-4182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271">CVE-2016-4271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272">CVE-2016-4272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273">CVE-2016-4273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274">CVE-2016-4274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275">CVE-2016-4275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276">CVE-2016-4276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277">CVE-2016-4277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278">CVE-2016-4278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279">CVE-2016-4279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280">CVE-2016-4280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281">CVE-2016-4281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282">CVE-2016-4282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283">CVE-2016-4283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284">CVE-2016-4284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285">CVE-2016-4285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286">CVE-2016-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287">CVE-2016-4287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921">CVE-2016-6921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922">CVE-2016-6922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923">CVE-2016-6923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924">CVE-2016-6924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925">CVE-2016-6925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926">CVE-2016-6926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927">CVE-2016-6927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929">CVE-2016-6929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930">CVE-2016-6930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931">CVE-2016-6931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932">CVE-2016-6932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981">CVE-2016-6981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982">CVE-2016-6982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983">CVE-2016-6983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984">CVE-2016-6984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985">CVE-2016-6985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986">CVE-2016-6986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987">CVE-2016-6987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989">CVE-2016-6989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990">CVE-2016-6990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992">CVE-2016-6992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855">CVE-2016-7855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182">CVE-2016-4182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271">CVE-2016-4271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272">CVE-2016-4272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273">CVE-2016-4273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274">CVE-2016-4274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275">CVE-2016-4275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276">CVE-2016-4276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277">CVE-2016-4277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278">CVE-2016-4278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279">CVE-2016-4279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280">CVE-2016-4280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281">CVE-2016-4281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282">CVE-2016-4282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283">CVE-2016-4283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284">CVE-2016-4284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285">CVE-2016-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286">CVE-2016-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287">CVE-2016-4287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921">CVE-2016-6921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922">CVE-2016-6922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923">CVE-2016-6923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924">CVE-2016-6924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925">CVE-2016-6925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926">CVE-2016-6926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927">CVE-2016-6927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929">CVE-2016-6929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930">CVE-2016-6930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931">CVE-2016-6931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932">CVE-2016-6932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981">CVE-2016-6981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982">CVE-2016-6982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983">CVE-2016-6983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984">CVE-2016-6984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985">CVE-2016-6985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986">CVE-2016-6986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987">CVE-2016-6987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989">CVE-2016-6989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990">CVE-2016-6990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992">CVE-2016-6992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855">CVE-2016-7855</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Sep 2016 22:34:48 +0000">
+ <metadata tag="requester" timestamp="2016-09-15T22:34:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 18:13:05 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T18:13:05Z">b-man</metadata>
</glsa>
diff --git a/glsa-201610-11.xml b/glsa-201610-11.xml
index 2339916f..8bbceac4 100644
--- a/glsa-201610-11.xml
+++ b/glsa-201610-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Wget, the worst of
which could lead to the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>October 29, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-10-29: 1</revised>
<bug>560418</bug>
<bug>585926</bug>
<access>remote</access>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4971">CVE-2016-4971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4971">CVE-2016-4971</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jul 2016 11:56:24 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Oct 2016 13:29:55 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-02T11:56:24Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-29T13:29:55Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-01.xml b/glsa-201611-01.xml
index 348fe8da..3ff50331 100644
--- a/glsa-201611-01.xml
+++ b/glsa-201611-01.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in UnZip allowing remote
attackers to execute arbitrary code and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 01, 2016</announced>
- <revised>November 01, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-01</announced>
+ <revised>2016-11-01: 1</revised>
<bug>528082</bug>
<bug>533748</bug>
<bug>537424</bug>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8139">CVE-2014-8139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8140">CVE-2014-8140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8141">CVE-2014-8141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9636">CVE-2014-9636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8139">CVE-2014-8139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8140">CVE-2014-8140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8141">CVE-2014-8141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9636">CVE-2014-9636</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 09 Jul 2016 02:22:34 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 13:18:35 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-09T02:22:34Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T13:18:35Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-02.xml b/glsa-201611-02.xml
index 4cbaa7a4..72ad5ffa 100644
--- a/glsa-201611-02.xml
+++ b/glsa-201611-02.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in OpenVPN, the worst of
which allows remote attackers to read encrypted traffic.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 01, 2016</announced>
- <revised>November 01, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-01</announced>
+ <revised>2016-11-01: 1</revised>
<bug>582902</bug>
<bug>592070</bug>
<access>remote</access>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6329">CVE-2016-6329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6329">CVE-2016-6329</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2016 00:38:08 +0000">
+ <metadata tag="requester" timestamp="2016-09-10T00:38:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 13:24:59 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T13:24:59Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-03.xml b/glsa-201611-03.xml
index 628df566..9dc5e87b 100644
--- a/glsa-201611-03.xml
+++ b/glsa-201611-03.xml
@@ -6,7 +6,7 @@
OpenOffice, the worst of which allows for the remote execution of arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
+ <product type="ebuild"/>
<announced>2016-11-04</announced>
<revised>2017-04-17: 2</revised>
<bug>565026</bug>
@@ -70,19 +70,19 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551">
CVE-2015-4551
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212">
CVE-2015-5212
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213">
CVE-2015-5213
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214">
CVE-2015-5214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4324">CVE-2016-4324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4324">CVE-2016-4324</uri>
</references>
<metadata tag="requester" timestamp="2016-09-10T07:32:58Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-17T17:52:18Z">b-man</metadata>
diff --git a/glsa-201611-04.xml b/glsa-201611-04.xml
index 4cc41969..e622336e 100644
--- a/glsa-201611-04.xml
+++ b/glsa-201611-04.xml
@@ -6,9 +6,9 @@
software suites allowing remote attackers to remotely execute arbitrary
code, obtain information, and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 04, 2016</announced>
- <revised>November 04, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-04</announced>
+ <revised>2016-11-04: 1</revised>
<bug>597516</bug>
<access>remote</access>
<affected>
@@ -60,14 +60,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Oct 2016 12:41:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2016 08:28:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-10-19T12:41:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-04T08:28:05Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-05.xml b/glsa-201611-05.xml
index c8facf0b..2138850c 100644
--- a/glsa-201611-05.xml
+++ b/glsa-201611-05.xml
@@ -6,8 +6,8 @@
specified.
</synopsis>
<product type="ebuild">tnftp</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>527302</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8517">CVE-2014-8517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8517">CVE-2014-8517</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 19:31:36 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T19:31:36Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 06:40:01 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T06:40:01Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-06.xml b/glsa-201611-06.xml
index e1f5beb0..61ef0e94 100644
--- a/glsa-201611-06.xml
+++ b/glsa-201611-06.xml
@@ -4,8 +4,8 @@
<title>xinetd: Privilege escalation </title>
<synopsis>A vulnerability in xinetd could lead to privilege escalation.</synopsis>
<product type="ebuild">xinetd</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>488158</bug>
<access>remote</access>
<affected>
@@ -37,10 +37,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4342">CVE-2013-4342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4342">CVE-2013-4342</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:25:51 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:25:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:16:41 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:16:41Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-07.xml b/glsa-201611-07.xml
index c469fb98..316bef1e 100644
--- a/glsa-201611-07.xml
+++ b/glsa-201611-07.xml
@@ -4,8 +4,8 @@
<title>polkit: Heap-corruption on duplicate IDs </title>
<synopsis>polkit is vulnerable to local privilege escalation.</synopsis>
<product type="ebuild">polkit</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>555666</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3255">CVE-2015-3255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3255">CVE-2015-3255</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Dec 2015 00:47:50 +0000">
+ <metadata tag="requester" timestamp="2015-12-25T00:47:50Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:23:23 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:23:23Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-08.xml b/glsa-201611-08.xml
index ae2cd49f..a1e0ba35 100644
--- a/glsa-201611-08.xml
+++ b/glsa-201611-08.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>564244</bug>
<bug>565678</bug>
<bug>568216</bug>
@@ -62,14 +62,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7981">CVE-2015-7981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8540">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7981">CVE-2015-7981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8540">
CVE-2015-8540
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:42:59 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:42:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:39:40 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:39:40Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-09.xml b/glsa-201611-09.xml
index 5d88bac9..5d330ae7 100644
--- a/glsa-201611-09.xml
+++ b/glsa-201611-09.xml
@@ -6,8 +6,8 @@
allows gaining of privileges on the host system.
</synopsis>
<product type="ebuild">xen</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>588780</bug>
<bug>593198</bug>
<bug>594850</bug>
@@ -57,14 +57,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6258">CVE-2016-6258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7092">CVE-2016-7092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7093">CVE-2016-7093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7094">CVE-2016-7094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7777">CVE-2016-7777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6258">CVE-2016-6258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7092">CVE-2016-7092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7093">CVE-2016-7093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7094">CVE-2016-7094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7777">CVE-2016-7777</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2016 06:59:48 +0000">
+ <metadata tag="requester" timestamp="2016-09-10T06:59:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:42:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:42:10Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-10.xml b/glsa-201611-10.xml
index 86d1fc1c..9cdacea8 100644
--- a/glsa-201611-10.xml
+++ b/glsa-201611-10.xml
@@ -3,9 +3,9 @@
<glsa id="201611-10">
<title>libuv: Privilege escalation</title>
<synopsis>A vulnerability in libuv could lead to privilege escalation.</synopsis>
- <product type="ebuild"></product>
- <announced>November 17, 2016</announced>
- <revised>November 17, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-17</announced>
+ <revised>2016-11-17: 1</revised>
<bug>540826</bug>
<access>local, remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0278">CVE-2015-0278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0278">CVE-2015-0278</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 08:33:56 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Nov 2016 10:08:59 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T08:33:56Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-17T10:08:59Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-11.xml b/glsa-201611-11.xml
index e26c96b0..d314d881 100644
--- a/glsa-201611-11.xml
+++ b/glsa-201611-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in QEMU, the worst of
which could cause a Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 18, 2016</announced>
- <revised>January 02, 2017: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-18</announced>
+ <revised>2017-01-02: 2</revised>
<bug>594368</bug>
<bug>594520</bug>
<bug>595192</bug>
@@ -54,28 +54,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10029">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10029">
CVE-2016-10029
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7161">CVE-2016-7161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7423">CVE-2016-7423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7466">CVE-2016-7466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7907">CVE-2016-7907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7908">CVE-2016-7908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7909">CVE-2016-7909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7994">CVE-2016-7994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8576">CVE-2016-8576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8577">CVE-2016-8577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8578">CVE-2016-8578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8668">CVE-2016-8668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8669">CVE-2016-8669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8909">CVE-2016-8909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8910">CVE-2016-8910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9102">CVE-2016-9102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9103">CVE-2016-9103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9104">CVE-2016-9104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9105">CVE-2016-9105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7161">CVE-2016-7161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7423">CVE-2016-7423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7466">CVE-2016-7466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7907">CVE-2016-7907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7908">CVE-2016-7908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7909">CVE-2016-7909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7994">CVE-2016-7994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8576">CVE-2016-8576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8577">CVE-2016-8577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8578">CVE-2016-8578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8668">CVE-2016-8668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8669">CVE-2016-8669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8909">CVE-2016-8909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8910">CVE-2016-8910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9102">CVE-2016-9102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9103">CVE-2016-9103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9104">CVE-2016-9104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9105">CVE-2016-9105</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 07:04:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 10:33:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T07:04:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T10:33:37Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-12.xml b/glsa-201611-12.xml
index 4967a676..e339fd30 100644
--- a/glsa-201611-12.xml
+++ b/glsa-201611-12.xml
@@ -6,8 +6,8 @@
which allows for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>572884</bug>
<bug>578810</bug>
<bug>580038</bug>
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9762">CVE-2014-9762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9763">CVE-2014-9763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9764">CVE-2014-9764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4024">CVE-2016-4024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9762">CVE-2014-9762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9763">CVE-2014-9763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9764">CVE-2014-9764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4024">CVE-2016-4024</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2016 06:16:27 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:06:30 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-20T06:16:27Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:06:30Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-13.xml b/glsa-201611-13.xml
index b714e298..5633941b 100644
--- a/glsa-201611-13.xml
+++ b/glsa-201611-13.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">mongodb</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>542880</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1609">CVE-2015-1609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1609">CVE-2015-1609</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 20:38:27 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:09:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T20:38:27Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:09:15Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-14.xml b/glsa-201611-14.xml
index cb039edc..fa8b2cbf 100644
--- a/glsa-201611-14.xml
+++ b/glsa-201611-14.xml
@@ -6,8 +6,8 @@
the worst of which may allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>564304</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2695">CVE-2015-2695</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2696">CVE-2015-2696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2697">CVE-2015-2697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2695">CVE-2015-2695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2696">CVE-2015-2696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2697">CVE-2015-2697</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 22:59:55 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T22:59:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:10:32 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:10:32Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-15.xml b/glsa-201611-15.xml
index 4a3c457c..1ba5ff39 100644
--- a/glsa-201611-15.xml
+++ b/glsa-201611-15.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 3</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 3</revised>
<bug>542220</bug>
<bug>579752</bug>
<access>remote</access>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8868">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8868">
CVE-2015-8868
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Jun 2015 14:35:30 +0000">
+ <metadata tag="requester" timestamp="2015-06-06T14:35:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:21 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:21Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-16.xml b/glsa-201611-16.xml
index 25b56ead..c199ce74 100644
--- a/glsa-201611-16.xml
+++ b/glsa-201611-16.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 3</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 3</revised>
<bug>599416</bug>
<access>remote</access>
<affected>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5199">CVE-2016-5199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5200">CVE-2016-5200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5201">CVE-2016-5201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5202">CVE-2016-5202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5199">CVE-2016-5199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5200">CVE-2016-5200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5201">CVE-2016-5201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5202">CVE-2016-5202</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 09:25:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:33 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T09:25:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:33Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-17.xml b/glsa-201611-17.xml
index 57fe7d0a..608418dc 100644
--- a/glsa-201611-17.xml
+++ b/glsa-201611-17.xml
@@ -6,8 +6,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">rpcbind</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>560990</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7236">CVE-2015-7236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7236">CVE-2015-7236</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:23:05 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:23:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:44 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:44Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-18.xml b/glsa-201611-18.xml
index dd1f7342..0438e1d2 100644
--- a/glsa-201611-18.xml
+++ b/glsa-201611-18.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>599204</bug>
<access>remote</access>
<affected>
@@ -53,16 +53,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7857">CVE-2016-7857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7858">CVE-2016-7858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7859">CVE-2016-7859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7860">CVE-2016-7860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7861">CVE-2016-7861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7862">CVE-2016-7862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7863">CVE-2016-7863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7864">CVE-2016-7864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7865">CVE-2016-7865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7857">CVE-2016-7857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7858">CVE-2016-7858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7859">CVE-2016-7859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7860">CVE-2016-7860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7861">CVE-2016-7861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7862">CVE-2016-7862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7863">CVE-2016-7863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7864">CVE-2016-7864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7865">CVE-2016-7865</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:18:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:00 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:18:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:00Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-19.xml b/glsa-201611-19.xml
index c615310c..e44b7c07 100644
--- a/glsa-201611-19.xml
+++ b/glsa-201611-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tar</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>598334</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6321">CVE-2016-6321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6321">CVE-2016-6321</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:05:11 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:11 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:05:11Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:11Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-20.xml b/glsa-201611-20.xml
index fdace5c7..01074931 100644
--- a/glsa-201611-20.xml
+++ b/glsa-201611-20.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">testdisk</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>548258</bug>
<access>local, remote</access>
<affected>
@@ -52,6 +52,6 @@
TestDisk check_OS2MB Stack Buffer overflow
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Apr 2015 18:55:08 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:23 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-04-30T18:55:08Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:23Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-21.xml b/glsa-201611-21.xml
index 5dc51fe7..d532b1f2 100644
--- a/glsa-201611-21.xml
+++ b/glsa-201611-21.xml
@@ -6,8 +6,8 @@
of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 30, 2016</announced>
- <revised>November 30, 2016: 1</revised>
+ <announced>2016-11-30</announced>
+ <revised>2016-11-30: 1</revised>
<bug>581990</bug>
<bug>593526</bug>
<bug>593530</bug>
@@ -49,17 +49,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3714">CVE-2016-3714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3715">CVE-2016-3715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3716">CVE-2016-3716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3717">CVE-2016-3717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3718">CVE-2016-3718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5010">CVE-2016-5010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5842">CVE-2016-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6491">CVE-2016-6491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7799">CVE-2016-7799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7906">CVE-2016-7906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3714">CVE-2016-3714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3715">CVE-2016-3715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3716">CVE-2016-3716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3717">CVE-2016-3717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3718">CVE-2016-3718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5010">CVE-2016-5010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5842">CVE-2016-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6491">CVE-2016-6491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7799">CVE-2016-7799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7906">CVE-2016-7906</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2016 12:32:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Nov 2016 21:42:34 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-10-11T12:32:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-30T21:42:34Z">b-man</metadata>
</glsa>
diff --git a/glsa-201611-22.xml b/glsa-201611-22.xml
index c3199e4d..888ff9ce 100644
--- a/glsa-201611-22.xml
+++ b/glsa-201611-22.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 30, 2016</announced>
- <revised>November 30, 2016: 1</revised>
+ <announced>2016-11-30</announced>
+ <revised>2016-11-30: 1</revised>
<bug>578734</bug>
<bug>581834</bug>
<bug>584204</bug>
@@ -51,47 +51,47 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071">CVE-2016-4071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072">CVE-2016-4072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073">CVE-2016-4073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537">CVE-2016-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538">CVE-2016-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539">CVE-2016-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540">CVE-2016-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541">CVE-2016-4541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542">CVE-2016-4542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543">CVE-2016-4543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544">CVE-2016-4544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385">CVE-2016-5385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289">CVE-2016-6289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290">CVE-2016-6290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291">CVE-2016-6291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292">CVE-2016-6292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294">CVE-2016-6294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295">CVE-2016-6295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296">CVE-2016-6296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297">CVE-2016-6297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124">CVE-2016-7124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125">CVE-2016-7125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126">CVE-2016-7126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127">CVE-2016-7127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128">CVE-2016-7128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129">CVE-2016-7129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130">CVE-2016-7130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131">CVE-2016-7131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132">CVE-2016-7132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133">CVE-2016-7133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134">CVE-2016-7134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411">CVE-2016-7411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412">CVE-2016-7412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413">CVE-2016-7413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414">CVE-2016-7414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416">CVE-2016-7416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417">CVE-2016-7417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418">CVE-2016-7418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071">CVE-2016-4071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072">CVE-2016-4072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073">CVE-2016-4073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537">CVE-2016-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538">CVE-2016-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539">CVE-2016-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540">CVE-2016-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541">CVE-2016-4541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542">CVE-2016-4542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543">CVE-2016-4543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544">CVE-2016-4544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385">CVE-2016-5385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289">CVE-2016-6289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290">CVE-2016-6290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291">CVE-2016-6291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292">CVE-2016-6292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294">CVE-2016-6294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295">CVE-2016-6295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296">CVE-2016-6296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297">CVE-2016-6297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124">CVE-2016-7124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125">CVE-2016-7125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126">CVE-2016-7126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127">CVE-2016-7127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128">CVE-2016-7128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129">CVE-2016-7129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130">CVE-2016-7130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131">CVE-2016-7131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132">CVE-2016-7132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133">CVE-2016-7133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134">CVE-2016-7134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411">CVE-2016-7411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412">CVE-2016-7412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413">CVE-2016-7413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414">CVE-2016-7414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416">CVE-2016-7416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417">CVE-2016-7417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418">CVE-2016-7418</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jun 2016 11:17:24 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Nov 2016 21:46:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-19T11:17:24Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-30T21:46:26Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-01.xml b/glsa-201612-01.xml
index eb26bb56..e2d2ffa1 100644
--- a/glsa-201612-01.xml
+++ b/glsa-201612-01.xml
@@ -6,8 +6,8 @@
(RNG) is predictable.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>December 02, 2016</announced>
- <revised>December 02, 2016: 1</revised>
+ <announced>2016-12-02</announced>
+ <revised>2016-12-02: 1</revised>
<bug>591536</bug>
<access>local</access>
<affected>
@@ -59,12 +59,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
<uri link="http://formal.iti.kit.edu/~klebanov/pubs/libgcrypt-cve-2016-6313.pdf">
Entropy Loss and Output Predictability in the Libgcrypt PRNG
</uri>
- <uri link="http://security.gentoo.org/glsa/201610-04">GLSA 201610-04</uri>
+ <uri link="https://security.gentoo.org/glsa/201610-04">GLSA 201610-04</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Nov 2016 18:28:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Dec 2016 09:38:37 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-30T18:28:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-02T09:38:37Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-02.xml b/glsa-201612-02.xml
index 22806cf1..e3782917 100644
--- a/glsa-201612-02.xml
+++ b/glsa-201612-02.xml
@@ -6,8 +6,8 @@
privileges.
</synopsis>
<product type="ebuild">davfs2</product>
- <announced>December 02, 2016</announced>
- <revised>December 02, 2016: 1</revised>
+ <announced>2016-12-02</announced>
+ <revised>2016-12-02: 1</revised>
<bug>485232</bug>
<access>local</access>
<affected>
@@ -55,10 +55,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4362">CVE-2013-4362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4362">CVE-2013-4362</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Dec 2015 21:54:18 +0000">
+ <metadata tag="requester" timestamp="2015-12-07T21:54:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Dec 2016 13:32:55 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-02T13:32:55Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-03.xml b/glsa-201612-03.xml
index 79c38fcb..8535ebbc 100644
--- a/glsa-201612-03.xml
+++ b/glsa-201612-03.xml
@@ -6,8 +6,8 @@
of which might allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>December 03, 2016</announced>
- <revised>December 03, 2016: 1</revised>
+ <announced>2016-12-03</announced>
+ <revised>2016-12-03: 1</revised>
<bug>533750</bug>
<bug>566682</bug>
<access>local, remote</access>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496">CVE-2014-9496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7805">CVE-2015-7805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496">CVE-2014-9496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7805">CVE-2015-7805</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:52:16 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:52:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Dec 2016 10:28:00 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-03T10:28:00Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-04.xml b/glsa-201612-04.xml
index f13661b1..ab102ec5 100644
--- a/glsa-201612-04.xml
+++ b/glsa-201612-04.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>564246</bug>
<bug>577610</bug>
<access>local, remote</access>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2147">CVE-2016-2147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2148">CVE-2016-2148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2147">CVE-2016-2147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2148">CVE-2016-2148</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 06:28:35 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T06:28:35Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 06:39:16 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T06:39:16Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-05.xml b/glsa-201612-05.xml
index be917ecd..97513c6e 100644
--- a/glsa-201612-05.xml
+++ b/glsa-201612-05.xml
@@ -6,8 +6,8 @@
allowed to specify the font name.
</synopsis>
<product type="ebuild">pygments</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>564478</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8557">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8557">
CVE-2015-8557
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Dec 2015 00:25:56 +0000">
+ <metadata tag="requester" timestamp="2015-12-08T00:25:56Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 06:50:34 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T06:50:34Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-06.xml b/glsa-201612-06.xml
index c3cb0a54..622ca215 100644
--- a/glsa-201612-06.xml
+++ b/glsa-201612-06.xml
@@ -6,8 +6,8 @@
handling code.
</synopsis>
<product type="ebuild">nghttp2</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>569518</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659">CVE-2015-8659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659">CVE-2015-8659</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:09:46 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:09:46Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 10:59:07 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T10:59:07Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-07.xml b/glsa-201612-07.xml
index 53a9f09b..1cc9d1d8 100644
--- a/glsa-201612-07.xml
+++ b/glsa-201612-07.xml
@@ -6,8 +6,8 @@
to arbitrary code execution.
</synopsis>
<product type="ebuild">dpkg</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>567258</bug>
<access>local, remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0860">CVE-2015-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0860">CVE-2015-0860</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:05:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:05:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:01:29 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:01:29Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-08.xml b/glsa-201612-08.xml
index bff22bab..a1caf1d1 100644
--- a/glsa-201612-08.xml
+++ b/glsa-201612-08.xml
@@ -6,8 +6,8 @@
allow remote attackers to have an unspecified impact via unknown vectors.
</synopsis>
<product type="ebuild">cifs-utils</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>552634</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2830">CVE-2014-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2830">CVE-2014-2830</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:13:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:13:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:02:29 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:02:29Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-09.xml b/glsa-201612-09.xml
index bdd40361..b8616d3b 100644
--- a/glsa-201612-09.xml
+++ b/glsa-201612-09.xml
@@ -6,8 +6,8 @@
allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">gd</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>587662</bug>
<bug>587968</bug>
<bug>592720</bug>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5766">CVE-2016-5766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6128">CVE-2016-6128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6132">CVE-2016-6132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6207">CVE-2016-6207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7568">CVE-2016-7568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5766">CVE-2016-5766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6128">CVE-2016-6128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6132">CVE-2016-6132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6207">CVE-2016-6207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7568">CVE-2016-7568</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:53:45 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:07:34 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:53:45Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:07:34Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-10.xml b/glsa-201612-10.xml
index 8717429a..155d5df4 100644
--- a/glsa-201612-10.xml
+++ b/glsa-201612-10.xml
@@ -6,8 +6,8 @@
Control Lists (ACL).
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>568870</bug>
<access>local</access>
<affected>
@@ -53,10 +53,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5313">CVE-2015-5313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5313">CVE-2015-5313</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Dec 2015 05:15:17 +0000">
+ <metadata tag="requester" timestamp="2015-12-24T05:15:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:17:48 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:17:48Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-11.xml b/glsa-201612-11.xml
index e2146ef3..cdba7e82 100644
--- a/glsa-201612-11.xml
+++ b/glsa-201612-11.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>601486</bug>
<access>remote</access>
<affected>
@@ -46,35 +46,35 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5203">CVE-2016-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5204">CVE-2016-5204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5205">CVE-2016-5205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5206">CVE-2016-5206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5207">CVE-2016-5207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5208">CVE-2016-5208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5209">CVE-2016-5209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5210">CVE-2016-5210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5211">CVE-2016-5211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5212">CVE-2016-5212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5213">CVE-2016-5213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5214">CVE-2016-5214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5215">CVE-2016-5215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5217">CVE-2016-5217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5218">CVE-2016-5218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5219">CVE-2016-5219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5220">CVE-2016-5220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5221">CVE-2016-5221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5222">CVE-2016-5222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5223">CVE-2016-5223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5224">CVE-2016-5224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5225">CVE-2016-5225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5226">CVE-2016-5226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9650">CVE-2016-9650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9651">CVE-2016-9651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9652">CVE-2016-9652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5203">CVE-2016-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5204">CVE-2016-5204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5205">CVE-2016-5205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5206">CVE-2016-5206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5207">CVE-2016-5207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5208">CVE-2016-5208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5209">CVE-2016-5209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5210">CVE-2016-5210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5211">CVE-2016-5211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5212">CVE-2016-5212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5213">CVE-2016-5213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5214">CVE-2016-5214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5215">CVE-2016-5215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5217">CVE-2016-5217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5218">CVE-2016-5218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5219">CVE-2016-5219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5220">CVE-2016-5220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5221">CVE-2016-5221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5222">CVE-2016-5222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5223">CVE-2016-5223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5224">CVE-2016-5224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5225">CVE-2016-5225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5226">CVE-2016-5226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9650">CVE-2016-9650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9651">CVE-2016-9651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9652">CVE-2016-9652</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 14:25:29 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T14:25:29Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 00:47:06 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T00:47:06Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-12.xml b/glsa-201612-12.xml
index 8abe387e..fb99408e 100644
--- a/glsa-201612-12.xml
+++ b/glsa-201612-12.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">patch</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>538658</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:47:45 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:47:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 01:16:43 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T01:16:43Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-13.xml b/glsa-201612-13.xml
index f482089e..6829274b 100644
--- a/glsa-201612-13.xml
+++ b/glsa-201612-13.xml
@@ -4,8 +4,8 @@
<title>nghttp2: Denial of Service</title>
<synopsis>Nghttp2 is vulnerable to a Denial of Service attack.</synopsis>
<product type="ebuild">nghttp2</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>574780</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1544">CVE-2016-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1544">CVE-2016-1544</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 13:39:02 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 01:23:37 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T13:39:02Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T01:23:37Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-14.xml b/glsa-201612-14.xml
index a6f07494..a1658091 100644
--- a/glsa-201612-14.xml
+++ b/glsa-201612-14.xml
@@ -6,8 +6,8 @@
potentially lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>December 06, 2016</announced>
- <revised>December 06, 2016: 1</revised>
+ <announced>2016-12-06</announced>
+ <revised>2016-12-06: 1</revised>
<bug>530844</bug>
<access>local</access>
<affected>
@@ -48,8 +48,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9114">CVE-2014-9114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9114">CVE-2014-9114</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 22:56:21 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Dec 2016 03:44:24 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T22:56:21Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-06T03:44:24Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-15.xml b/glsa-201612-15.xml
index 39d087b3..ecf60286 100644
--- a/glsa-201612-15.xml
+++ b/glsa-201612-15.xml
@@ -6,8 +6,8 @@
may allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">arj</product>
- <announced>December 06, 2016</announced>
- <revised>December 06, 2016: 1</revised>
+ <announced>2016-12-06</announced>
+ <revised>2016-12-06: 1</revised>
<bug>535708</bug>
<bug>541500</bug>
<access>local, remote</access>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0556">CVE-2015-0556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0557">CVE-2015-0557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2782">CVE-2015-2782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0556">CVE-2015-0556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0557">CVE-2015-0557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2782">CVE-2015-2782</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Nov 2016 01:08:04 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Dec 2016 03:45:36 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-28T01:08:04Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-06T03:45:36Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-16.xml b/glsa-201612-16.xml
index bc7d206b..fa8e1ecd 100644
--- a/glsa-201612-16.xml
+++ b/glsa-201612-16.xml
@@ -6,8 +6,8 @@
which allows attackers to conduct a time based side-channel attack.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>581234</bug>
<bug>585142</bug>
<bug>585276</bug>
@@ -55,26 +55,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105">CVE-2016-2105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106">CVE-2016-2106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107">CVE-2016-2107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108">CVE-2016-2108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109">CVE-2016-2109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176">CVE-2016-2176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177">CVE-2016-2177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178">CVE-2016-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180">CVE-2016-2180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304">CVE-2016-6304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305">CVE-2016-6305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306">CVE-2016-6306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052">CVE-2016-7052</uri>
- <uri link="http://eprint.iacr.org/2016/594.pdf">Make Sure DSA Signing
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105">CVE-2016-2105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106">CVE-2016-2106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107">CVE-2016-2107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108">CVE-2016-2108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109">CVE-2016-2109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176">CVE-2016-2176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177">CVE-2016-2177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178">CVE-2016-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180">CVE-2016-2180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304">CVE-2016-6304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305">CVE-2016-6305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306">CVE-2016-6306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052">CVE-2016-7052</uri>
+ <uri link="https://eprint.iacr.org/2016/594.pdf">Make Sure DSA Signing
Exponentiations Really are Constant-Time
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jun 2016 21:30:06 +0000">
+ <metadata tag="requester" timestamp="2016-06-06T21:30:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:26:27 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:26:27Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-17.xml b/glsa-201612-17.xml
index 51e0c943..bbaa2543 100644
--- a/glsa-201612-17.xml
+++ b/glsa-201612-17.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">pecl_http</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>587466</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5873">CVE-2016-5873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5873">CVE-2016-5873</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2016 03:43:01 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:29:47 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-25T03:43:01Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:29:47Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-18.xml b/glsa-201612-18.xml
index e6d11b5b..23c0a5b7 100644
--- a/glsa-201612-18.xml
+++ b/glsa-201612-18.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in OpenSSH, the worst of
which allows remote attackers to cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>576954</bug>
<bug>580410</bug>
<bug>589088</bug>
@@ -48,14 +48,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8325">CVE-2015-8325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1908">CVE-2016-1908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3115">CVE-2016-3115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6210">CVE-2016-6210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8858">CVE-2016-8858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8325">CVE-2015-8325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1908">CVE-2016-1908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3115">CVE-2016-3115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6210">CVE-2016-6210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8858">CVE-2016-8858</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Sep 2016 05:14:39 +0000">
+ <metadata tag="requester" timestamp="2016-09-17T05:14:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:31:11 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:31:11Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-19.xml b/glsa-201612-19.xml
index 00550c7e..1a68035b 100644
--- a/glsa-201612-19.xml
+++ b/glsa-201612-19.xml
@@ -6,8 +6,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mercurial</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>533008</bug>
<bug>544332</bug>
<bug>578546</bug>
@@ -45,15 +45,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462">CVE-2014-9462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068">CVE-2016-3068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069">CVE-2016-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105">CVE-2016-3105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630">CVE-2016-3630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462">CVE-2014-9462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068">CVE-2016-3068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069">CVE-2016-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105">CVE-2016-3105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630">CVE-2016-3630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 22:49:35 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T22:49:35Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:35:02 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:35:02Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-20.xml b/glsa-201612-20.xml
index cc31888d..28e9a342 100644
--- a/glsa-201612-20.xml
+++ b/glsa-201612-20.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">jq</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>580606</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863">
CVE-2015-8863
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:07:39 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:09:23 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:07:39Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:09:23Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-21.xml b/glsa-201612-21.xml
index 1e5603e1..f55dff0b 100644
--- a/glsa-201612-21.xml
+++ b/glsa-201612-21.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">sqlite</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>549258</bug>
<bug>574420</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7036">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7036">
CVE-2015-7036
</uri>
- <uri link="http://blog.fuzzing-project.org/10-Two-invalid-read-errors-heap-overflows-in-SQLite-TFPA-0062015.html">
+ <uri link="https://blog.fuzzing-project.org/10-Two-invalid-read-errors-heap-overflows-in-SQLite-TFPA-0062015.html">
Two invalid read errors / heap overflows in SQLite (TFPA 006/2015)
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:57:30 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:10:39 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:57:30Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:10:39Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-22.xml b/glsa-201612-22.xml
index b0c9f471..89854571 100644
--- a/glsa-201612-22.xml
+++ b/glsa-201612-22.xml
@@ -6,8 +6,8 @@
arbitrary code or a Denial of Service condition.
</synopsis>
<product type="ebuild">coreutils</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>530514</bug>
<access>local, remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9471">CVE-2014-9471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9471">CVE-2014-9471</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Nov 2016 06:48:53 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:11:59 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-27T06:48:53Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:11:59Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-23.xml b/glsa-201612-23.xml
index aba9f4d1..e86398f2 100644
--- a/glsa-201612-23.xml
+++ b/glsa-201612-23.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">socat</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>573602</bug>
<access>remote</access>
<affected>
@@ -51,6 +51,6 @@
Socat security advisory 8
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:50:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:12:54 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:50:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:12:54Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-24.xml b/glsa-201612-24.xml
index 04ef17ed..a16db62e 100644
--- a/glsa-201612-24.xml
+++ b/glsa-201612-24.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">binutils</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>526626</bug>
<access>local, remote</access>
<affected>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8484">CVE-2014-8484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8485">CVE-2014-8485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8501">CVE-2014-8501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8502">CVE-2014-8502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8503">CVE-2014-8503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8504">CVE-2014-8504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8737">CVE-2014-8737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8738">CVE-2014-8738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8484">CVE-2014-8484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8485">CVE-2014-8485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8501">CVE-2014-8501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8502">CVE-2014-8502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8503">CVE-2014-8503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8504">CVE-2014-8504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8737">CVE-2014-8737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8738">CVE-2014-8738</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2016 00:21:44 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:14:11 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-25T00:21:44Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:14:11Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-25.xml b/glsa-201612-25.xml
index 72a1e6be..15a4a3d5 100644
--- a/glsa-201612-25.xml
+++ b/glsa-201612-25.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cracklib</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>591456</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6318">CVE-2016-6318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6318">CVE-2016-6318</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 02:46:03 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T02:46:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:55:10 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:55:10Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-26.xml b/glsa-201612-26.xml
index 29273b9b..5755d0b2 100644
--- a/glsa-201612-26.xml
+++ b/glsa-201612-26.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>560632</bug>
<bug>572430</bug>
<bug>577608</bug>
@@ -48,14 +48,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8871">CVE-2015-8871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1923">CVE-2016-1923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1924">CVE-2016-1924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3181">CVE-2016-3181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3182">CVE-2016-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3183">CVE-2016-3183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7445">CVE-2016-7445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8871">CVE-2015-8871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1923">CVE-2016-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1924">CVE-2016-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3181">CVE-2016-3181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3182">CVE-2016-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3183">CVE-2016-3183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7445">CVE-2016-7445</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Dec 2016 23:52:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:55:57 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-07T23:52:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:55:57Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-27.xml b/glsa-201612-27.xml
index f4fd7f64..095a7132 100644
--- a/glsa-201612-27.xml
+++ b/glsa-201612-27.xml
@@ -6,8 +6,8 @@
of which allows local users to escalate privileges.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 2</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 2</revised>
<bug>505274</bug>
<bug>537218</bug>
<bug>550964</bug>
@@ -55,21 +55,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0981">CVE-2014-0981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0983">CVE-2014-0983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6588">CVE-2014-6588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6589">CVE-2014-6589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6590">CVE-2014-6590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6595">CVE-2014-6595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0377">CVE-2015-0377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0418">CVE-2015-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0427">CVE-2015-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5608">CVE-2016-5608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5610">CVE-2016-5610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5611">CVE-2016-5611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5613">CVE-2016-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0981">CVE-2014-0981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0983">CVE-2014-0983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6588">CVE-2014-6588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6589">CVE-2014-6589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6590">CVE-2014-6590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6595">CVE-2014-6595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0377">CVE-2015-0377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0418">CVE-2015-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0427">CVE-2015-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5608">CVE-2016-5608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5610">CVE-2016-5610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5611">CVE-2016-5611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5613">CVE-2016-5613</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:13:06 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:42:01 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:13:06Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:42:01Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-28.xml b/glsa-201612-28.xml
index 6b944e4c..468381d5 100644
--- a/glsa-201612-28.xml
+++ b/glsa-201612-28.xml
@@ -5,9 +5,9 @@
<synopsis>A vulnerability in Docker could lead to the escalation of
privileges.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>581236</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3697">CVE-2016-3697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3697">CVE-2016-3697</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Nov 2016 00:31:47 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:40:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-26T00:31:47Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:40:37Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-29.xml b/glsa-201612-29.xml
index a5f95961..09b19c25 100644
--- a/glsa-201612-29.xml
+++ b/glsa-201612-29.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libmms</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>507822</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2892">CVE-2014-2892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2892">CVE-2014-2892</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Nov 2016 10:19:34 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:47:07 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-27T10:19:34Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:47:07Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-30.xml b/glsa-201612-30.xml
index f64bf35d..8b8e841b 100644
--- a/glsa-201612-30.xml
+++ b/glsa-201612-30.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">sox</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>533296</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8145">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8145">
CVE-2014-8145
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:47:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:50:03 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:47:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:50:03Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-31.xml b/glsa-201612-31.xml
index 3328cc0d..a5b6f068 100644
--- a/glsa-201612-31.xml
+++ b/glsa-201612-31.xml
@@ -5,9 +5,9 @@
<synopsis>Two vulnerabilities have been found in exFAT allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 12, 2016</announced>
- <revised>December 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-12</announced>
+ <revised>2016-12-12: 1</revised>
<bug>563936</bug>
<access>remote</access>
<affected>
@@ -41,13 +41,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8026">CVE-2015-8026</uri>
- <uri link="http://blog.fuzzing-project.org/25-Heap-overflow-and-endless-loop-in-exfatfsck-exfat-utils.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8026">CVE-2015-8026</uri>
+ <uri link="https://blog.fuzzing-project.org/25-Heap-overflow-and-endless-loop-in-exfatfsck-exfat-utils.html">
Heap overflow and endless loop in exfatfsck / exfat-utils
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 02:26:18 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T02:26:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Dec 2016 00:14:52 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-12T00:14:52Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-32.xml b/glsa-201612-32.xml
index 1d75ea1e..3f920b95 100644
--- a/glsa-201612-32.xml
+++ b/glsa-201612-32.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">elfutils</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>507246</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172">CVE-2014-0172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172">CVE-2014-0172</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 14:55:36 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:58:39 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T14:55:36Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:58:39Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-33.xml b/glsa-201612-33.xml
index f6bece07..8f0f2589 100644
--- a/glsa-201612-33.xml
+++ b/glsa-201612-33.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>556316</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3228">CVE-2015-3228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3228">CVE-2015-3228</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 15:13:30 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:58:50 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T15:13:30Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:58:50Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-34.xml b/glsa-201612-34.xml
index 20b5a3ce..69a25a65 100644
--- a/glsa-201612-34.xml
+++ b/glsa-201612-34.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">systemd</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>486904</bug>
<access>local, remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4391">CVE-2013-4391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4393">CVE-2013-4393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4394">CVE-2013-4394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4391">CVE-2013-4391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4393">CVE-2013-4393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4394">CVE-2013-4394</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 20:50:18 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:01 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T20:50:18Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:01Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-35.xml b/glsa-201612-35.xml
index adb930ee..f7207512 100644
--- a/glsa-201612-35.xml
+++ b/glsa-201612-35.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xstream</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>497652</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7285">CVE-2013-7285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7285">CVE-2013-7285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 21:29:45 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:12 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T21:29:45Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:12Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-36.xml b/glsa-201612-36.xml
index d6f4b40b..756e2df7 100644
--- a/glsa-201612-36.xml
+++ b/glsa-201612-36.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tigervnc</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>534714</bug>
<access>remote</access>
<affected>
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8240">CVE-2014-8240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8240">CVE-2014-8240</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 21:39:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:26 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T21:39:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:26Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-37.xml b/glsa-201612-37.xml
index bb1b9944..b5bfe470 100644
--- a/glsa-201612-37.xml
+++ b/glsa-201612-37.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pixman</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>561526</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://lists.x.org/archives/xorg-announce/2015-September/002637.html">
+ <uri link="https://lists.x.org/archives/xorg-announce/2015-September/002637.html">
Pixman 0.32.8 Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 08:11:30 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T08:11:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:37 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:37Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-38.xml b/glsa-201612-38.xml
index e03177a6..7d783384 100644
--- a/glsa-201612-38.xml
+++ b/glsa-201612-38.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">botan</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>574034</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2194">CVE-2016-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2195">CVE-2016-2195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2194">CVE-2016-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2195">CVE-2016-2195</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 22:26:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:50 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T22:26:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:50Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-39.xml b/glsa-201612-39.xml
index 73380626..e4a5292a 100644
--- a/glsa-201612-39.xml
+++ b/glsa-201612-39.xml
@@ -6,8 +6,8 @@
execution.
</synopsis>
<product type="ebuild">bash</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>594496</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0634">CVE-2016-0634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0634">CVE-2016-0634</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Sep 2016 02:45:43 +0000">
+ <metadata tag="requester" timestamp="2016-09-23T02:45:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 07:00:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T07:00:09Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-40.xml b/glsa-201612-40.xml
index a82fde22..d9d1eafd 100644
--- a/glsa-201612-40.xml
+++ b/glsa-201612-40.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">squashfs-tools</product>
- <announced>December 13, 2016</announced>
- <revised>December 14, 2016: 3</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-14: 3</revised>
<bug>427356</bug>
<access>remote</access>
<affected>
@@ -48,9 +48,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4024">CVE-2012-4024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4025">CVE-2012-4025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4024">CVE-2012-4024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4025">CVE-2012-4025</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 23:27:04 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2016 10:21:21 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T23:27:04Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-14T10:21:21Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-41.xml b/glsa-201612-41.xml
index 30e31e81..d1526915 100644
--- a/glsa-201612-41.xml
+++ b/glsa-201612-41.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">webkit-gtk</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 3</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 3</revised>
<bug>570034</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4412">CVE-2014-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4413">CVE-2014-4413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4414">CVE-2014-4414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4412">CVE-2014-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4413">CVE-2014-4413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4414">CVE-2014-4414</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2016 11:54:30 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 13:01:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-03-12T11:54:30Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T13:01:16Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-42.xml b/glsa-201612-42.xml
index 88d846c8..9dd2338a 100644
--- a/glsa-201612-42.xml
+++ b/glsa-201612-42.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 1</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 1</revised>
<bug>582536</bug>
<bug>598762</bug>
<access>remote</access>
@@ -42,11 +42,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4338">CVE-2016-4338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9140">CVE-2016-9140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4338">CVE-2016-4338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9140">CVE-2016-9140</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jul 2015 02:35:28 +0000">
+ <metadata tag="requester" timestamp="2015-07-21T02:35:28Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 11:41:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T11:41:09Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-43.xml b/glsa-201612-43.xml
index a1668a6f..571cd30c 100644
--- a/glsa-201612-43.xml
+++ b/glsa-201612-43.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service conditions.
</synopsis>
<product type="ebuild">nodejs</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 1</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 1</revised>
<bug>568900</bug>
<bug>586084</bug>
<bug>595256</bug>
@@ -53,13 +53,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8027">CVE-2015-8027</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2086">CVE-2016-2086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2216">CVE-2016-2216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5325">CVE-2016-5325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8027">CVE-2015-8027</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2086">CVE-2016-2086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2216">CVE-2016-2216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5325">CVE-2016-5325</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Sep 2016 07:02:17 +0000">
+ <metadata tag="requester" timestamp="2016-09-07T07:02:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 14:35:08 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T14:35:08Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-44.xml b/glsa-201612-44.xml
index 5e87434f..bd983d9e 100644
--- a/glsa-201612-44.xml
+++ b/glsa-201612-44.xml
@@ -6,8 +6,8 @@
code execution.
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>601410</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9920">CVE-2016-9920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9920">CVE-2016-9920</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Dec 2016 15:26:48 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 06:42:27 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-23T15:26:48Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T06:42:27Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-45.xml b/glsa-201612-45.xml
index 4ef88625..cdb19a99 100644
--- a/glsa-201612-45.xml
+++ b/glsa-201612-45.xml
@@ -6,8 +6,8 @@
could allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tor</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>591008</bug>
<bug>597394</bug>
<bug>597524</bug>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8860">CVE-2016-8860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8860">CVE-2016-8860</uri>
<uri link="https://raw.githubusercontent.com/torproject/tor/tor-0.2.8.9/ChangeLog">
Tor 0.2.8.9 Change Log
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Nov 2016 01:21:24 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 06:50:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-28T01:21:24Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T06:50:16Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-46.xml b/glsa-201612-46.xml
index 5a12cc06..58436200 100644
--- a/glsa-201612-46.xml
+++ b/glsa-201612-46.xml
@@ -6,8 +6,8 @@
of which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xerces-c</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>575700</bug>
<bug>584506</bug>
<access>local, remote</access>
@@ -45,9 +45,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0729">CVE-2016-0729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2099">CVE-2016-2099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0729">CVE-2016-0729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2099">CVE-2016-2099</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Oct 2016 11:41:27 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 07:11:18 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-10-15T11:41:27Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T07:11:18Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-47.xml b/glsa-201612-47.xml
index c56e4fb8..9c16ff51 100644
--- a/glsa-201612-47.xml
+++ b/glsa-201612-47.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">samba</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>568432</bug>
<bug>578004</bug>
<access>local, remote</access>
@@ -44,21 +44,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3223">CVE-2015-3223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5252">CVE-2015-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5296">CVE-2015-5296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5299">CVE-2015-5299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5330">CVE-2015-5330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7540">CVE-2015-7540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8467">CVE-2015-8467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2110">CVE-2016-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2111">CVE-2016-2111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2112">CVE-2016-2112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2113">CVE-2016-2113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2114">CVE-2016-2114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2115">CVE-2016-2115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2118">CVE-2016-2118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3223">CVE-2015-3223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5252">CVE-2015-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5296">CVE-2015-5296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5299">CVE-2015-5299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5330">CVE-2015-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7540">CVE-2015-7540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8467">CVE-2015-8467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2110">CVE-2016-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2111">CVE-2016-2111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2112">CVE-2016-2112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2113">CVE-2016-2113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2114">CVE-2016-2114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2115">CVE-2016-2115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2118">CVE-2016-2118</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Dec 2016 13:31:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 07:24:48 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-19T13:31:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T07:24:48Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-48.xml b/glsa-201612-48.xml
index e396e98f..d57ba28b 100644
--- a/glsa-201612-48.xml
+++ b/glsa-201612-48.xml
@@ -6,8 +6,8 @@
worst of which may allow bypassing of sandbox protection.
</synopsis>
<product type="ebuild">firejail</product>
- <announced>December 27, 2016</announced>
- <revised>December 27, 2016: 1</revised>
+ <announced>2016-12-27</announced>
+ <revised>2016-12-27: 1</revised>
<bug>601994</bug>
<access>local, remote</access>
<affected>
@@ -60,6 +60,6 @@
Firejail Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Dec 2016 02:08:23 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2016 00:43:05 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-05T02:08:23Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-27T00:43:05Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-49.xml b/glsa-201612-49.xml
index 624084e3..37e57f82 100644
--- a/glsa-201612-49.xml
+++ b/glsa-201612-49.xml
@@ -4,8 +4,8 @@
<title>mod_wsgi: Privilege escalation</title>
<synopsis>A vulnerability in mod_wsgi could lead to privilege escalation.</synopsis>
<product type="ebuild">mod_wsgi</product>
- <announced>December 30, 2016</announced>
- <revised>December 30, 2016: 1</revised>
+ <announced>2016-12-30</announced>
+ <revised>2016-12-30: 1</revised>
<bug>536270</bug>
<access>local, remote</access>
<affected>
@@ -40,8 +40,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8583">CVE-2014-8583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8583">CVE-2014-8583</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:29:47 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Dec 2016 00:41:42 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:29:47Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-30T00:41:42Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-50.xml b/glsa-201612-50.xml
index e6bc9029..beb69dd1 100644
--- a/glsa-201612-50.xml
+++ b/glsa-201612-50.xml
@@ -6,8 +6,8 @@
which could lead to privilege escalation.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>603604</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6972">CVE-2015-6972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6973">CVE-2015-6973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7707">CVE-2015-7707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6972">CVE-2015-6972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6973">CVE-2015-6973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7707">CVE-2015-7707</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Dec 2016 00:17:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 06:27:02 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-31T00:17:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T06:27:02Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-51.xml b/glsa-201612-51.xml
index c37baa1b..223aa72f 100644
--- a/glsa-201612-51.xml
+++ b/glsa-201612-51.xml
@@ -4,8 +4,8 @@
<title>Icinga: Privilege escalation</title>
<synopsis>A vulnerability in Icinga could lead to privilege escalation.</synopsis>
<product type="ebuild">icinga</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>603534</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Dec 2016 23:44:53 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 06:37:34 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-30T23:44:53Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T06:37:34Z">whissi</metadata>
</glsa>
diff --git a/glsa-201612-52.xml b/glsa-201612-52.xml
index a1191085..4b82b26e 100644
--- a/glsa-201612-52.xml
+++ b/glsa-201612-52.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">pillow</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>507982</bug>
<bug>573958</bug>
<bug>599608</bug>
@@ -50,17 +50,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1932">CVE-2014-1932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1933">CVE-2014-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0740">CVE-2016-0740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0775">CVE-2016-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2533">CVE-2016-2533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4009">CVE-2016-4009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9189">CVE-2016-9189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9190">CVE-2016-9190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1932">CVE-2014-1932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1933">CVE-2014-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0740">CVE-2016-0740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0775">CVE-2016-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2533">CVE-2016-2533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4009">CVE-2016-4009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9189">CVE-2016-9189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9190">CVE-2016-9190</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:10:45 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:10:45Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 14:15:38 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T14:15:38Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-53.xml b/glsa-201612-53.xml
index dcc094c1..f048b5ad 100644
--- a/glsa-201612-53.xml
+++ b/glsa-201612-53.xml
@@ -6,8 +6,8 @@
which may allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">cyassl</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>507418</bug>
<access>local, remote</access>
<affected>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2896">CVE-2014-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2897">CVE-2014-2897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2898">CVE-2014-2898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2899">CVE-2014-2899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2900">CVE-2014-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2896">CVE-2014-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2897">CVE-2014-2897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2898">CVE-2014-2898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2899">CVE-2014-2899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2900">CVE-2014-2900</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 15:11:37 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 14:47:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T15:11:37Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T14:47:50Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-54.xml b/glsa-201612-54.xml
index e4b8d2c9..938744a3 100644
--- a/glsa-201612-54.xml
+++ b/glsa-201612-54.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chicken</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>467966</bug>
<bug>486350</bug>
<bug>510712</bug>
@@ -45,14 +45,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2024">CVE-2013-2024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385">CVE-2013-4385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3776">CVE-2014-3776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9651">CVE-2014-9651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4556">CVE-2015-4556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2024">CVE-2013-2024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385">CVE-2013-4385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3776">CVE-2014-3776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9651">CVE-2014-9651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4556">CVE-2015-4556</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 14:54:52 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T14:54:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 15:19:08 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T15:19:08Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-55.xml b/glsa-201612-55.xml
index 70bb09e0..d2050d6d 100644
--- a/glsa-201612-55.xml
+++ b/glsa-201612-55.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>585782</bug>
<access>remote</access>
<affected>
@@ -54,6 +54,6 @@
Prevent overread when decoding malformed JPEG
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2016 06:32:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 15:38:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-20T06:32:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T15:38:15Z">b-man</metadata>
</glsa>
diff --git a/glsa-201612-56.xml b/glsa-201612-56.xml
index 3d8a5ee1..ee20e9bb 100644
--- a/glsa-201612-56.xml
+++ b/glsa-201612-56.xml
@@ -6,8 +6,8 @@
could lead to the execution of arbitrary code on the host system.
</synopsis>
<product type="ebuild">xen</product>
- <announced>December 31, 2016</announced>
- <revised>January 03, 2017: 2</revised>
+ <announced>2016-12-31</announced>
+ <revised>2017-01-03: 2</revised>
<bug>600382</bug>
<bug>600662</bug>
<bug>601248</bug>
@@ -71,26 +71,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10024">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10024">
CVE-2016-10024
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9377">CVE-2016-9377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9378">CVE-2016-9378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9379">CVE-2016-9379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9380">CVE-2016-9380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9381">CVE-2016-9381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9382">CVE-2016-9382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9383">CVE-2016-9383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9384">CVE-2016-9384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9385">CVE-2016-9385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9386">CVE-2016-9386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9637">CVE-2016-9637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9815">CVE-2016-9815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9816">CVE-2016-9816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9817">CVE-2016-9817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9818">CVE-2016-9818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9932">CVE-2016-9932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9377">CVE-2016-9377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9378">CVE-2016-9378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9379">CVE-2016-9379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9380">CVE-2016-9380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9381">CVE-2016-9381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9382">CVE-2016-9382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9383">CVE-2016-9383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9384">CVE-2016-9384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9385">CVE-2016-9385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9386">CVE-2016-9386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9637">CVE-2016-9637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9815">CVE-2016-9815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9816">CVE-2016-9816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9817">CVE-2016-9817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9818">CVE-2016-9818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9932">CVE-2016-9932</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Nov 2016 10:47:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 05:55:18 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-26T10:47:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T05:55:18Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-01.xml b/glsa-201701-01.xml
index 9b51efed..185bab89 100644
--- a/glsa-201701-01.xml
+++ b/glsa-201701-01.xml
@@ -6,8 +6,8 @@
worst of which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mysql, mariadb</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 2</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 2</revised>
<bug>593584</bug>
<bug>593608</bug>
<bug>593614</bug>
@@ -59,33 +59,33 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3492">CVE-2016-3492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3495">CVE-2016-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5507">CVE-2016-5507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5584">CVE-2016-5584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5609">CVE-2016-5609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5612">CVE-2016-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5625">CVE-2016-5625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5626">CVE-2016-5626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5627">CVE-2016-5627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5628">CVE-2016-5628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5629">CVE-2016-5629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5630">CVE-2016-5630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5631">CVE-2016-5631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5632">CVE-2016-5632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5633">CVE-2016-5633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5634">CVE-2016-5634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5635">CVE-2016-5635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6652">CVE-2016-6652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6662">CVE-2016-6662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8283">CVE-2016-8283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8284">CVE-2016-8284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8286">CVE-2016-8286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8287">CVE-2016-8287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8288">CVE-2016-8288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8289">CVE-2016-8289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8290">CVE-2016-8290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3492">CVE-2016-3492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3495">CVE-2016-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5507">CVE-2016-5507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5584">CVE-2016-5584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5609">CVE-2016-5609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5612">CVE-2016-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5625">CVE-2016-5625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5626">CVE-2016-5626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5627">CVE-2016-5627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5628">CVE-2016-5628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5629">CVE-2016-5629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5630">CVE-2016-5630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5631">CVE-2016-5631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5632">CVE-2016-5632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5633">CVE-2016-5633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5634">CVE-2016-5634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5635">CVE-2016-5635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6652">CVE-2016-6652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6662">CVE-2016-6662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8283">CVE-2016-8283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8284">CVE-2016-8284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8286">CVE-2016-8286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8287">CVE-2016-8287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8288">CVE-2016-8288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8289">CVE-2016-8289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8290">CVE-2016-8290</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Nov 2016 05:29:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 13:32:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-19T05:29:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T13:32:50Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-02.xml b/glsa-201701-02.xml
index 7ad55118..d06a7588 100644
--- a/glsa-201701-02.xml
+++ b/glsa-201701-02.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>595268</bug>
<bug>600174</bug>
<access>local</access>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7543">CVE-2016-7543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9401">CVE-2016-9401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7543">CVE-2016-7543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9401">CVE-2016-9401</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2016 09:45:02 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 13:44:22 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-06-21T09:45:02Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T13:44:22Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-03.xml b/glsa-201701-03.xml
index c3c714b2..bf039ace 100644
--- a/glsa-201701-03.xml
+++ b/glsa-201701-03.xml
@@ -6,8 +6,8 @@
of which allows for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>548110</bug>
<bug>552646</bug>
<bug>582526</bug>
@@ -52,40 +52,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2304">CVE-2015-2304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8915">CVE-2015-8915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8916">CVE-2015-8916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8917">CVE-2015-8917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8918">CVE-2015-8918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8919">CVE-2015-8919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8920">CVE-2015-8920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8921">CVE-2015-8921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8922">CVE-2015-8922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8923">CVE-2015-8923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8924">CVE-2015-8924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8925">CVE-2015-8925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8926">CVE-2015-8926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8927">CVE-2015-8927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8928">CVE-2015-8928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8929">CVE-2015-8929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8930">CVE-2015-8930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8931">CVE-2015-8931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8932">CVE-2015-8932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8933">CVE-2015-8933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8934">CVE-2015-8934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1541">CVE-2016-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4300">CVE-2016-4300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4301">CVE-2016-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4302">CVE-2016-4302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4809">CVE-2016-4809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5418">CVE-2016-5418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5844">CVE-2016-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6250">CVE-2016-6250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7166">CVE-2016-7166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8687">CVE-2016-8687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8688">CVE-2016-8688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8689">CVE-2016-8689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2304">CVE-2015-2304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8915">CVE-2015-8915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8916">CVE-2015-8916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8917">CVE-2015-8917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8918">CVE-2015-8918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8919">CVE-2015-8919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8920">CVE-2015-8920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8921">CVE-2015-8921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8922">CVE-2015-8922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8923">CVE-2015-8923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8924">CVE-2015-8924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8925">CVE-2015-8925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8926">CVE-2015-8926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8927">CVE-2015-8927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8928">CVE-2015-8928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8929">CVE-2015-8929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8930">CVE-2015-8930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8931">CVE-2015-8931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8932">CVE-2015-8932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8933">CVE-2015-8933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8934">CVE-2015-8934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1541">CVE-2016-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4300">CVE-2016-4300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4301">CVE-2016-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4302">CVE-2016-4302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4809">CVE-2016-4809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5418">CVE-2016-5418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5844">CVE-2016-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6250">CVE-2016-6250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7166">CVE-2016-7166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8687">CVE-2016-8687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8688">CVE-2016-8688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8689">CVE-2016-8689</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Jun 2016 12:09:04 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 14:31:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-27T12:09:04Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T14:31:15Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-04.xml b/glsa-201701-04.xml
index d7998ddf..c552a2d5 100644
--- a/glsa-201701-04.xml
+++ b/glsa-201701-04.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>530842</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9116">CVE-2014-9116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9116">CVE-2014-9116</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:02:45 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:05:18 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:02:45Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:05:18Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-05.xml b/glsa-201701-05.xml
index fa7db246..bcba592f 100644
--- a/glsa-201701-05.xml
+++ b/glsa-201701-05.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>590478</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6301">CVE-2016-6301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6301">CVE-2016-6301</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:19:19 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:33:56 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:19:19Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:33:56Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-06.xml b/glsa-201701-06.xml
index 6da62bac..94406875 100644
--- a/glsa-201701-06.xml
+++ b/glsa-201701-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>538930</bug>
<access>local, remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0247">CVE-2015-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0247">CVE-2015-0247</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:12:55 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:41:00 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:12:55Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:41:00Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-07.xml b/glsa-201701-07.xml
index 63992a11..a303cddb 100644
--- a/glsa-201701-07.xml
+++ b/glsa-201701-07.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">openvswitch</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 2</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 2</revised>
<bug>577568</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2074">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2074">
CVE-2016-2074
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:31:09 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:00:54 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:31:09Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:00:54Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-08.xml b/glsa-201701-08.xml
index d2e6fc3f..192d507c 100644
--- a/glsa-201701-08.xml
+++ b/glsa-201701-08.xml
@@ -6,8 +6,8 @@
could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>579312</bug>
<bug>600176</bug>
<access>remote</access>
@@ -43,28 +43,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9422">CVE-2016-9422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9423">CVE-2016-9423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9424">CVE-2016-9424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9425">CVE-2016-9425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9426">CVE-2016-9426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9428">CVE-2016-9428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9429">CVE-2016-9429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9430">CVE-2016-9430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9431">CVE-2016-9431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9432">CVE-2016-9432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9433">CVE-2016-9433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9434">CVE-2016-9434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9435">CVE-2016-9435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9436">CVE-2016-9436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9437">CVE-2016-9437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9438">CVE-2016-9438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9439">CVE-2016-9439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9440">CVE-2016-9440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9441">CVE-2016-9441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9442">CVE-2016-9442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9443">CVE-2016-9443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9422">CVE-2016-9422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9423">CVE-2016-9423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9424">CVE-2016-9424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9425">CVE-2016-9425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9426">CVE-2016-9426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9428">CVE-2016-9428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9429">CVE-2016-9429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9430">CVE-2016-9430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9431">CVE-2016-9431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9432">CVE-2016-9432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9433">CVE-2016-9433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9434">CVE-2016-9434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9435">CVE-2016-9435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9436">CVE-2016-9436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9437">CVE-2016-9437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9438">CVE-2016-9438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9439">CVE-2016-9439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9440">CVE-2016-9440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9441">CVE-2016-9441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9442">CVE-2016-9442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9443">CVE-2016-9443</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 13:18:36 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:15:30 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T13:18:36Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:15:30Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-09.xml b/glsa-201701-09.xml
index f8379277..bb7a61f7 100644
--- a/glsa-201701-09.xml
+++ b/glsa-201701-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xdg-utils</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>472888</bug>
<access>local, remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9622">CVE-2014-9622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9622">CVE-2014-9622</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:56:54 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:34:46 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:56:54Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:34:46Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-10.xml b/glsa-201701-10.xml
index e27e10e1..8920b835 100644
--- a/glsa-201701-10.xml
+++ b/glsa-201701-10.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libotr, pidgin-otr</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>576914</bug>
<bug>576916</bug>
<access>remote</access>
@@ -57,9 +57,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8833">CVE-2015-8833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2851">CVE-2016-2851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8833">CVE-2015-8833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2851">CVE-2016-2851</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:51:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:19:57 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:51:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:19:57Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-11.xml b/glsa-201701-11.xml
index b2e8ed52..3159e10d 100644
--- a/glsa-201701-11.xml
+++ b/glsa-201701-11.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">musl</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>597498</bug>
<access>local, remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8859">CVE-2016-8859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8859">CVE-2016-8859</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:23:08 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:34:33 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:23:08Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:34:33Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-12.xml b/glsa-201701-12.xml
index e8494cb9..24dc452e 100644
--- a/glsa-201701-12.xml
+++ b/glsa-201701-12.xml
@@ -6,8 +6,8 @@
lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">memcached</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>598836</bug>
<access>remote</access>
<affected>
@@ -44,19 +44,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8704">CVE-2016-8704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8705">CVE-2016-8705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8706">CVE-2016-8706</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0219/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8704">CVE-2016-8704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8705">CVE-2016-8705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8706">CVE-2016-8706</uri>
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0219/">
TALOS-2016-0219
</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0220/">
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0220/">
TALOS-2016-0220
</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0221/">
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0221/">
TALOS-2016-0221
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:31:20 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:42:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:31:20Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:42:05Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-13.xml b/glsa-201701-13.xml
index 7484a5b4..646eb834 100644
--- a/glsa-201701-13.xml
+++ b/glsa-201701-13.xml
@@ -6,8 +6,8 @@
to the arbitrary execution of code.
</synopsis>
<product type="ebuild">hdf5</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>601404</bug>
<bug>601408</bug>
<bug>601414</bug>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4330">CVE-2016-4330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4331">CVE-2016-4331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4332">CVE-2016-4332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4333">CVE-2016-4333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4330">CVE-2016-4330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4331">CVE-2016-4331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4332">CVE-2016-4332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4333">CVE-2016-4333</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:36:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:52:28 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:36:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:52:28Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-14.xml b/glsa-201701-14.xml
index 9810594f..0fed1ef1 100644
--- a/glsa-201701-14.xml
+++ b/glsa-201701-14.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">lzo</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>515238</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jul 2014 05:18:15 +0000">
+ <metadata tag="requester" timestamp="2014-07-10T05:18:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 15:16:02 +0000">
+ <metadata tag="submitter" timestamp="2017-01-02T15:16:02Z">
BlueKnight
</metadata>
</glsa>
diff --git a/glsa-201701-15.xml b/glsa-201701-15.xml
index 5209b617..0d6e503a 100644
--- a/glsa-201701-15.xml
+++ b/glsa-201701-15.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">firefox, thunderbird</product>
- <announced>January 03, 2017</announced>
- <revised>January 04, 2017: 2</revised>
+ <announced>2017-01-03</announced>
+ <revised>2017-01-04: 2</revised>
<bug>581326</bug>
<bug>590330</bug>
<bug>594616</bug>
@@ -88,82 +88,82 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2804">CVE-2016-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2805">CVE-2016-2805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2806">CVE-2016-2806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2807">CVE-2016-2807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2808">CVE-2016-2808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2809">CVE-2016-2809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2810">CVE-2016-2810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2811">CVE-2016-2811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2812">CVE-2016-2812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2813">CVE-2016-2813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2814">CVE-2016-2814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2816">CVE-2016-2816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2817">CVE-2016-2817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2820">CVE-2016-2820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2827">CVE-2016-2827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2830">CVE-2016-2830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2835">CVE-2016-2835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2836">CVE-2016-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2837">CVE-2016-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2838">CVE-2016-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2839">CVE-2016-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5250">CVE-2016-5250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5251">CVE-2016-5251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5252">CVE-2016-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5253">CVE-2016-5253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5254">CVE-2016-5254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5255">CVE-2016-5255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5256">CVE-2016-5256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5257">CVE-2016-5257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5258">CVE-2016-5258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5259">CVE-2016-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5260">CVE-2016-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5261">CVE-2016-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5262">CVE-2016-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5263">CVE-2016-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5264">CVE-2016-5264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5265">CVE-2016-5265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5266">CVE-2016-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5267">CVE-2016-5267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5268">CVE-2016-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5270">CVE-2016-5270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5271">CVE-2016-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5272">CVE-2016-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5273">CVE-2016-5273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5274">CVE-2016-5274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5275">CVE-2016-5275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5276">CVE-2016-5276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5277">CVE-2016-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5278">CVE-2016-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5279">CVE-2016-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5280">CVE-2016-5280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5281">CVE-2016-5281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5282">CVE-2016-5282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5283">CVE-2016-5283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5284">CVE-2016-5284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5290">CVE-2016-5290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5291">CVE-2016-5291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5293">CVE-2016-5293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5294">CVE-2016-5294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5296">CVE-2016-5296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5297">CVE-2016-5297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9064">CVE-2016-9064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9066">CVE-2016-9066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9893">CVE-2016-9893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9895">CVE-2016-9895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9897">CVE-2016-9897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9898">CVE-2016-9898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9899">CVE-2016-9899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9900">CVE-2016-9900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9901">CVE-2016-9901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9902">CVE-2016-9902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9904">CVE-2016-9904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9905">CVE-2016-9905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2804">CVE-2016-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2805">CVE-2016-2805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2806">CVE-2016-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2807">CVE-2016-2807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2808">CVE-2016-2808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2809">CVE-2016-2809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2810">CVE-2016-2810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2811">CVE-2016-2811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2812">CVE-2016-2812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2813">CVE-2016-2813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2814">CVE-2016-2814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2816">CVE-2016-2816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2817">CVE-2016-2817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2820">CVE-2016-2820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2827">CVE-2016-2827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2830">CVE-2016-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2835">CVE-2016-2835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2836">CVE-2016-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2837">CVE-2016-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2838">CVE-2016-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2839">CVE-2016-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5250">CVE-2016-5250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5251">CVE-2016-5251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5252">CVE-2016-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5253">CVE-2016-5253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5254">CVE-2016-5254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5255">CVE-2016-5255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5256">CVE-2016-5256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5257">CVE-2016-5257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5258">CVE-2016-5258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5259">CVE-2016-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5260">CVE-2016-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5261">CVE-2016-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5262">CVE-2016-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5263">CVE-2016-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5264">CVE-2016-5264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5265">CVE-2016-5265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5266">CVE-2016-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5267">CVE-2016-5267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5268">CVE-2016-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5270">CVE-2016-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5271">CVE-2016-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5272">CVE-2016-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5273">CVE-2016-5273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5274">CVE-2016-5274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5275">CVE-2016-5275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5276">CVE-2016-5276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5277">CVE-2016-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5278">CVE-2016-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5279">CVE-2016-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5280">CVE-2016-5280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5281">CVE-2016-5281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5282">CVE-2016-5282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5283">CVE-2016-5283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5284">CVE-2016-5284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5290">CVE-2016-5290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5291">CVE-2016-5291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5293">CVE-2016-5293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5294">CVE-2016-5294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5296">CVE-2016-5296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5297">CVE-2016-5297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9064">CVE-2016-9064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9066">CVE-2016-9066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9893">CVE-2016-9893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9895">CVE-2016-9895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9897">CVE-2016-9897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9898">CVE-2016-9898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9899">CVE-2016-9899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9900">CVE-2016-9900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9901">CVE-2016-9901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9902">CVE-2016-9902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9904">CVE-2016-9904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9905">CVE-2016-9905</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 23:32:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Jan 2017 14:37:04 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T23:32:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-04T14:37:04Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-16.xml b/glsa-201701-16.xml
index 69174de7..446048c7 100644
--- a/glsa-201701-16.xml
+++ b/glsa-201701-16.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>January 09, 2017</announced>
- <revised>January 09, 2017: 2</revised>
+ <announced>2017-01-09</announced>
+ <revised>2017-01-09: 2</revised>
<bug>484542</bug>
<bug>534108</bug>
<bug>538318</bug>
@@ -52,60 +52,60 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4243">CVE-2013-4243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8127">CVE-2014-8127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8128">CVE-2014-8128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8129">CVE-2014-8129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8130">CVE-2014-8130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9330">CVE-2014-9330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9655">CVE-2014-9655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1547">CVE-2015-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7313">CVE-2015-7313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7554">CVE-2015-7554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8665">CVE-2015-8665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8668">CVE-2015-8668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8683">CVE-2015-8683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8781">CVE-2015-8781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8782">CVE-2015-8782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8783">CVE-2015-8783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8784">CVE-2015-8784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3186">CVE-2016-3186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3619">CVE-2016-3619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3620">CVE-2016-3620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3621">CVE-2016-3621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3622">CVE-2016-3622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3623">CVE-2016-3623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3624">CVE-2016-3624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3625">CVE-2016-3625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3631">CVE-2016-3631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3632">CVE-2016-3632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3633">CVE-2016-3633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3634">CVE-2016-3634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3658">CVE-2016-3658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3945">CVE-2016-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3990">CVE-2016-3990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3991">CVE-2016-3991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5102">CVE-2016-5102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5314">CVE-2016-5314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5315">CVE-2016-5315</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5316">CVE-2016-5316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5317">CVE-2016-5317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5318">CVE-2016-5318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5319">CVE-2016-5319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5320">CVE-2016-5320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5321">CVE-2016-5321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5322">CVE-2016-5322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5323">CVE-2016-5323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5652">CVE-2016-5652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5875">CVE-2016-5875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6223">CVE-2016-6223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8331">CVE-2016-8331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9273">CVE-2016-9273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9297">CVE-2016-9297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9448">CVE-2016-9448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9453">CVE-2016-9453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9532">CVE-2016-9532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4243">CVE-2013-4243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8127">CVE-2014-8127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8128">CVE-2014-8128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8129">CVE-2014-8129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8130">CVE-2014-8130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9330">CVE-2014-9330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9655">CVE-2014-9655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1547">CVE-2015-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7313">CVE-2015-7313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7554">CVE-2015-7554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8665">CVE-2015-8665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8668">CVE-2015-8668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8683">CVE-2015-8683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8781">CVE-2015-8781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8782">CVE-2015-8782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8783">CVE-2015-8783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8784">CVE-2015-8784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3186">CVE-2016-3186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3619">CVE-2016-3619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3620">CVE-2016-3620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3621">CVE-2016-3621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3622">CVE-2016-3622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3623">CVE-2016-3623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3624">CVE-2016-3624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3625">CVE-2016-3625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3631">CVE-2016-3631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3632">CVE-2016-3632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3633">CVE-2016-3633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3634">CVE-2016-3634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3658">CVE-2016-3658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3945">CVE-2016-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3990">CVE-2016-3990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3991">CVE-2016-3991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5102">CVE-2016-5102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5314">CVE-2016-5314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5315">CVE-2016-5315</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5316">CVE-2016-5316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5317">CVE-2016-5317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5318">CVE-2016-5318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5319">CVE-2016-5319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5320">CVE-2016-5320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5321">CVE-2016-5321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5322">CVE-2016-5322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5323">CVE-2016-5323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5652">CVE-2016-5652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5875">CVE-2016-5875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6223">CVE-2016-6223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8331">CVE-2016-8331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9273">CVE-2016-9273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9297">CVE-2016-9297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9448">CVE-2016-9448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9453">CVE-2016-9453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9532">CVE-2016-9532</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2016 05:00:13 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Jan 2017 20:05:48 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-11T05:00:13Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-09T20:05:48Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-17.xml b/glsa-201701-17.xml
index 51d85c40..7393d5c8 100644
--- a/glsa-201701-17.xml
+++ b/glsa-201701-17.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 10, 2017</announced>
- <revised>January 10, 2017: 1</revised>
+ <announced>2017-01-10</announced>
+ <revised>2017-01-10: 1</revised>
<bug>602546</bug>
<access>remote</access>
<affected>
@@ -48,24 +48,24 @@
<uri link="https://helpx.adobe.com/security/products/flash-player/apsb16-39.html">
APSB16-39
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7867">CVE-2016-7867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7868">CVE-2016-7868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7869">CVE-2016-7869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7870">CVE-2016-7870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7871">CVE-2016-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7872">CVE-2016-7872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7873">CVE-2016-7873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7874">CVE-2016-7874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7875">CVE-2016-7875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7876">CVE-2016-7876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7877">CVE-2016-7877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7878">CVE-2016-7878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7879">CVE-2016-7879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7880">CVE-2016-7880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7881">CVE-2016-7881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7890">CVE-2016-7890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7892">CVE-2016-7892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7867">CVE-2016-7867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7868">CVE-2016-7868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7869">CVE-2016-7869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7870">CVE-2016-7870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7871">CVE-2016-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7872">CVE-2016-7872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7873">CVE-2016-7873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7874">CVE-2016-7874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7875">CVE-2016-7875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7876">CVE-2016-7876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7877">CVE-2016-7877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7878">CVE-2016-7878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7879">CVE-2016-7879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7880">CVE-2016-7880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7881">CVE-2016-7881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7890">CVE-2016-7890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7892">CVE-2016-7892</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 17:46:19 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Jan 2017 13:49:58 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T17:46:19Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-10T13:49:58Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-18.xml b/glsa-201701-18.xml
index 1885e30a..41eb8081 100644
--- a/glsa-201701-18.xml
+++ b/glsa-201701-18.xml
@@ -64,8 +64,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0772">CVE-2016-0772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5636">CVE-2016-5636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0772">CVE-2016-0772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5636">CVE-2016-5636</uri>
</references>
<metadata tag="requester" timestamp="2017-01-03T06:13:03Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-24T10:28:53Z">whissi</metadata>
diff --git a/glsa-201701-19.xml b/glsa-201701-19.xml
index d80778d0..7e2eba8f 100644
--- a/glsa-201701-19.xml
+++ b/glsa-201701-19.xml
@@ -6,8 +6,8 @@
privileges.
</synopsis>
<product type="ebuild">ntfs3g</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>550970</bug>
<access>local</access>
<affected>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3202">CVE-2015-3202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3202">CVE-2015-3202</uri>
<uri link="https://security.gentoo.org/glsa/201603-04">GLSA 201603-04</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Sep 2016 01:46:01 +0000">
+ <metadata tag="requester" timestamp="2016-09-07T01:46:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:04:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:04:09Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-20.xml b/glsa-201701-20.xml
index a6f49ee8..bde89f19 100644
--- a/glsa-201701-20.xml
+++ b/glsa-201701-20.xml
@@ -6,8 +6,8 @@
local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>596772</bug>
<access>local</access>
<affected>
@@ -56,6 +56,6 @@
<references>
<uri link="https://security.gentoo.org/glsa/201503-02">GLSA-201503-02</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 23:47:24 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:08:23 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T23:47:24Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:08:23Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-21.xml b/glsa-201701-21.xml
index e17ca487..5b20a7f3 100644
--- a/glsa-201701-21.xml
+++ b/glsa-201701-21.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">expat</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>458742</bug>
<bug>555642</bug>
<bug>577928</bug>
@@ -47,15 +47,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702">CVE-2012-6702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340">CVE-2013-0340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718">CVE-2016-0718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472">CVE-2016-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300">CVE-2016-5300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702">CVE-2012-6702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340">CVE-2013-0340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718">CVE-2016-0718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472">CVE-2016-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300">CVE-2016-5300</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 03:24:00 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T03:24:00Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:13:03 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:13:03Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-22.xml b/glsa-201701-22.xml
index 8853a745..4614faf3 100644
--- a/glsa-201701-22.xml
+++ b/glsa-201701-22.xml
@@ -6,8 +6,8 @@
to the way log files are handled.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>605008</bug>
<access>local</access>
<affected>
@@ -47,12 +47,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1247">CVE-2016-1247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1247">CVE-2016-1247</uri>
<uri link="https://www.debian.org/security/2016/dsa-3701">DSA-3701</uri>
<uri link="https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html">
Technical analysis
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 15:37:19 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:18:42 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T15:37:19Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:18:42Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-23.xml b/glsa-201701-23.xml
index 255d0dca..c0802a92 100644
--- a/glsa-201701-23.xml
+++ b/glsa-201701-23.xml
@@ -6,8 +6,8 @@
which might allow remote attackers to obtain ECDSA secret keys.
</synopsis>
<product type="ebuild">botan</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>581324</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2849">CVE-2016-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2850">CVE-2016-2850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2849">CVE-2016-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2850">CVE-2016-2850</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:45:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:23:40 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:45:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:23:40Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-24.xml b/glsa-201701-24.xml
index 90a33c74..8288b282 100644
--- a/glsa-201701-24.xml
+++ b/glsa-201701-24.xml
@@ -6,8 +6,8 @@
which may allow an attacker to bypass authentication.
</synopsis>
<product type="ebuild">pgbouncer</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>550124</bug>
<bug>600184</bug>
<access>remote</access>
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4054">CVE-2015-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6817">CVE-2015-6817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4054">CVE-2015-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6817">CVE-2015-6817</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 13:32:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:24:51 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T13:32:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:24:51Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-25.xml b/glsa-201701-25.xml
index d7af4d70..c5ab53e6 100644
--- a/glsa-201701-25.xml
+++ b/glsa-201701-25.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to inject arbitrary web script or HTML.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>538360</bug>
<access>remote</access>
<affected>
@@ -46,9 +46,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1431">CVE-2015-1431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1432">CVE-2015-1432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1431">CVE-2015-1431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1432">CVE-2015-1432</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 20:58:16 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:26:07 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T20:58:16Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:26:07Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-26.xml b/glsa-201701-26.xml
index bf8f1bd6..616ef6d1 100644
--- a/glsa-201701-26.xml
+++ b/glsa-201701-26.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>598750</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8864">CVE-2016-8864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8864">CVE-2016-8864</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Jan 2017 02:59:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:27:02 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-04T02:59:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:27:02Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-27.xml b/glsa-201701-27.xml
index 604624ab..f3cbbe48 100644
--- a/glsa-201701-27.xml
+++ b/glsa-201701-27.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">7zip</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>582832</bug>
<access>remote</access>
<affected>
@@ -45,9 +45,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2334">CVE-2016-2334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2335">CVE-2016-2335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2334">CVE-2016-2334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2335">CVE-2016-2335</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:11:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:28:26 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:11:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:28:26Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-28.xml b/glsa-201701-28.xml
index 705cb7c7..df6c758b 100644
--- a/glsa-201701-28.xml
+++ b/glsa-201701-28.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">c-ares</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>595536</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5180">CVE-2016-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5180">CVE-2016-5180</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 14:14:23 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:29:54 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T14:14:23Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:29:54Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-29.xml b/glsa-201701-29.xml
index fe208305..aa84589e 100644
--- a/glsa-201701-29.xml
+++ b/glsa-201701-29.xml
@@ -6,8 +6,8 @@
certain modeline options are treated.
</synopsis>
<product type="ebuild">vim, gvim</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>600650</bug>
<access>remote</access>
<affected>
@@ -58,8 +58,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1248">CVE-2016-1248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1248">CVE-2016-1248</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:07:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:33:33 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:07:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:33:33Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-30.xml b/glsa-201701-30.xml
index f157c7d8..9d9da36a 100644
--- a/glsa-201701-30.xml
+++ b/glsa-201701-30.xml
@@ -6,8 +6,8 @@
ploop containers.
</synopsis>
<product type="ebuild">vzctl</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>560522</bug>
<access>local, remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6927">CVE-2015-6927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6927">CVE-2015-6927</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 16:32:14 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:39:20 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T16:32:14Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:39:20Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-31.xml b/glsa-201701-31.xml
index 54285885..dff98ff1 100644
--- a/glsa-201701-31.xml
+++ b/glsa-201701-31.xml
@@ -6,8 +6,8 @@
using such scanners vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">flex</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>589820</bug>
<access>remote</access>
<affected>
@@ -54,8 +54,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6354">CVE-2016-6354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6354">CVE-2016-6354</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 14:07:40 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:41:44 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T14:07:40Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:41:44Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-32.xml b/glsa-201701-32.xml
index 1e77c325..5e59bc4e 100644
--- a/glsa-201701-32.xml
+++ b/glsa-201701-32.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>586964</bug>
<bug>593582</bug>
<bug>600814</bug>
@@ -48,70 +48,70 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4412">CVE-2016-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5097">CVE-2016-5097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5098">CVE-2016-5098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5099">CVE-2016-5099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5701">CVE-2016-5701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5702">CVE-2016-5702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5703">CVE-2016-5703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5704">CVE-2016-5704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5705">CVE-2016-5705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5706">CVE-2016-5706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5730">CVE-2016-5730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5731">CVE-2016-5731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5732">CVE-2016-5732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5733">CVE-2016-5733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5734">CVE-2016-5734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5739">CVE-2016-5739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6606">CVE-2016-6606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6607">CVE-2016-6607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6608">CVE-2016-6608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6609">CVE-2016-6609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6610">CVE-2016-6610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6611">CVE-2016-6611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6612">CVE-2016-6612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6613">CVE-2016-6613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6614">CVE-2016-6614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6615">CVE-2016-6615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6616">CVE-2016-6616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6617">CVE-2016-6617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6618">CVE-2016-6618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6619">CVE-2016-6619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6620">CVE-2016-6620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6622">CVE-2016-6622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6623">CVE-2016-6623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6624">CVE-2016-6624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6625">CVE-2016-6625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6626">CVE-2016-6626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6627">CVE-2016-6627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6628">CVE-2016-6628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6629">CVE-2016-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6630">CVE-2016-6630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6631">CVE-2016-6631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6632">CVE-2016-6632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6633">CVE-2016-6633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9847">CVE-2016-9847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9848">CVE-2016-9848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9849">CVE-2016-9849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9850">CVE-2016-9850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9851">CVE-2016-9851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9852">CVE-2016-9852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9853">CVE-2016-9853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9854">CVE-2016-9854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9855">CVE-2016-9855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9856">CVE-2016-9856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9857">CVE-2016-9857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9858">CVE-2016-9858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9859">CVE-2016-9859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9860">CVE-2016-9860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9861">CVE-2016-9861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9862">CVE-2016-9862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9863">CVE-2016-9863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9864">CVE-2016-9864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9865">CVE-2016-9865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9866">CVE-2016-9866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4412">CVE-2016-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5097">CVE-2016-5097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5098">CVE-2016-5098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5099">CVE-2016-5099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5701">CVE-2016-5701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5702">CVE-2016-5702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5703">CVE-2016-5703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5704">CVE-2016-5704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5705">CVE-2016-5705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5706">CVE-2016-5706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5730">CVE-2016-5730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5731">CVE-2016-5731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5732">CVE-2016-5732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5733">CVE-2016-5733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5734">CVE-2016-5734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5739">CVE-2016-5739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6606">CVE-2016-6606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6607">CVE-2016-6607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6608">CVE-2016-6608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6609">CVE-2016-6609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6610">CVE-2016-6610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6611">CVE-2016-6611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6612">CVE-2016-6612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6613">CVE-2016-6613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6614">CVE-2016-6614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6615">CVE-2016-6615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6616">CVE-2016-6616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6617">CVE-2016-6617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6618">CVE-2016-6618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6619">CVE-2016-6619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6620">CVE-2016-6620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6622">CVE-2016-6622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6623">CVE-2016-6623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6624">CVE-2016-6624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6625">CVE-2016-6625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6626">CVE-2016-6626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6627">CVE-2016-6627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6628">CVE-2016-6628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6629">CVE-2016-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6630">CVE-2016-6630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6631">CVE-2016-6631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6632">CVE-2016-6632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6633">CVE-2016-6633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9847">CVE-2016-9847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9848">CVE-2016-9848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9849">CVE-2016-9849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9850">CVE-2016-9850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9851">CVE-2016-9851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9852">CVE-2016-9852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9853">CVE-2016-9853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9854">CVE-2016-9854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9855">CVE-2016-9855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9856">CVE-2016-9856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9857">CVE-2016-9857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9858">CVE-2016-9858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9859">CVE-2016-9859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9860">CVE-2016-9860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9861">CVE-2016-9861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9862">CVE-2016-9862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9863">CVE-2016-9863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9864">CVE-2016-9864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9865">CVE-2016-9865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9866">CVE-2016-9866</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 14:45:51 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 13:05:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T14:45:51Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T13:05:16Z">whissi</metadata>
</glsa>
diff --git a/glsa-201701-33.xml b/glsa-201701-33.xml
index 544b7667..a481c57c 100644
--- a/glsa-201701-33.xml
+++ b/glsa-201701-33.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgres</product>
- <announced>January 12, 2017</announced>
- <revised>January 12, 2017: 4</revised>
+ <announced>2017-01-12</announced>
+ <revised>2017-01-12: 4</revised>
<bug>562586</bug>
<bug>574456</bug>
<bug>602130</bug>
@@ -79,13 +79,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5288">CVE-2015-5288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5289">CVE-2015-5289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0766">CVE-2016-0766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0773">CVE-2016-0773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5423">CVE-2016-5423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5424">CVE-2016-5424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5288">CVE-2015-5288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5289">CVE-2015-5289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0766">CVE-2016-0766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0773">CVE-2016-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5423">CVE-2016-5423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5424">CVE-2016-5424</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jan 2017 10:16:19 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2017 16:06:39 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-12T10:16:19Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-12T16:06:39Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-34.xml b/glsa-201701-34.xml
index 022a03cc..8a016722 100644
--- a/glsa-201701-34.xml
+++ b/glsa-201701-34.xml
@@ -4,8 +4,8 @@
<title>runC: Privilege escalation</title>
<synopsis>A vulnerability in runC could lead to privilege escalation.</synopsis>
<product type="ebuild">runc</product>
- <announced>January 12, 2017</announced>
- <revised>January 12, 2017: 1</revised>
+ <announced>2017-01-12</announced>
+ <revised>2017-01-12: 1</revised>
<bug>605378</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9962">CVE-2016-9962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9962">CVE-2016-9962</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jan 2017 13:07:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2017 22:52:16 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-12T13:07:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-12T22:52:16Z">b-man</metadata>
</glsa>
diff --git a/glsa-201701-35.xml b/glsa-201701-35.xml
index 293cdc8a..c1a46851 100644
--- a/glsa-201701-35.xml
+++ b/glsa-201701-35.xml
@@ -59,15 +59,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
</references>
<metadata tag="requester" timestamp="2016-06-30T12:33:30Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-13T15:14:27Z">b-man</metadata>
diff --git a/glsa-201701-36.xml b/glsa-201701-36.xml
index 379d9ec5..53a4e2e9 100644
--- a/glsa-201701-36.xml
+++ b/glsa-201701-36.xml
@@ -52,12 +52,12 @@
<uri link="https://www.apache.org/security/asf-httpoxy-response.txt">Apache
Software Foundation Projects and "httpoxy" CERT VU #797896
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3583">CVE-2014-3583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0736">CVE-2016-0736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2161">CVE-2016-2161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5387">CVE-2016-5387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8740">CVE-2016-8740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8743">CVE-2016-8743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3583">CVE-2014-3583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0736">CVE-2016-0736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2161">CVE-2016-2161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5387">CVE-2016-5387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8740">CVE-2016-8740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8743">CVE-2016-8743</uri>
<uri link="https://httpoxy.org/">HTTPoxy Website</uri>
</references>
<metadata tag="requester" timestamp="2016-11-01T05:14:20Z">BlueKnight</metadata>
diff --git a/glsa-201701-37.xml b/glsa-201701-37.xml
index 4d6574d9..7dd46069 100644
--- a/glsa-201701-37.xml
+++ b/glsa-201701-37.xml
@@ -57,27 +57,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5312">CVE-2015-5312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7497">CVE-2015-7497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7498">CVE-2015-7498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7499">CVE-2015-7499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7500">CVE-2015-7500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7941">CVE-2015-7941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7942">CVE-2015-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8035">CVE-2015-8035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8242">CVE-2015-8242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8806">CVE-2015-8806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1836">CVE-2016-1836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1838">CVE-2016-1838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1839">CVE-2016-1839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1840">CVE-2016-1840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2073">CVE-2016-2073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3627">CVE-2016-3627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3705">CVE-2016-3705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4483">CVE-2016-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4658">CVE-2016-4658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5312">CVE-2015-5312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7497">CVE-2015-7497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7498">CVE-2015-7498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7499">CVE-2015-7499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7500">CVE-2015-7500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7941">CVE-2015-7941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7942">CVE-2015-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8035">CVE-2015-8035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8242">CVE-2015-8242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8806">CVE-2015-8806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1836">CVE-2016-1836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1838">CVE-2016-1838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1839">CVE-2016-1839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1840">CVE-2016-1840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2073">CVE-2016-2073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3627">CVE-2016-3627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3705">CVE-2016-3705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4483">CVE-2016-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4658">CVE-2016-4658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
</references>
<metadata tag="requester" timestamp="2016-11-17T10:31:08Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-16T21:14:46Z">b-man</metadata>
diff --git a/glsa-201701-38.xml b/glsa-201701-38.xml
index 2e52d085..3a497e8d 100644
--- a/glsa-201701-38.xml
+++ b/glsa-201701-38.xml
@@ -43,26 +43,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000030">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000030">
CVE-2016-1000030
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2365">CVE-2016-2365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2366">CVE-2016-2366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2367">CVE-2016-2367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2368">CVE-2016-2368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2369">CVE-2016-2369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2370">CVE-2016-2370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2371">CVE-2016-2371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2372">CVE-2016-2372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2373">CVE-2016-2373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2374">CVE-2016-2374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2375">CVE-2016-2375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2376">CVE-2016-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2377">CVE-2016-2377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2378">CVE-2016-2378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2379">CVE-2016-2379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2380">CVE-2016-2380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4323">CVE-2016-4323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2365">CVE-2016-2365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2366">CVE-2016-2366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2367">CVE-2016-2367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2368">CVE-2016-2368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2369">CVE-2016-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2370">CVE-2016-2370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2371">CVE-2016-2371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2372">CVE-2016-2372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2373">CVE-2016-2373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2374">CVE-2016-2374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2375">CVE-2016-2375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2376">CVE-2016-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2377">CVE-2016-2377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2378">CVE-2016-2378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2379">CVE-2016-2379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2380">CVE-2016-2380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4323">CVE-2016-4323</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T06:16:34Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T03:34:45Z">b-man</metadata>
diff --git a/glsa-201701-39.xml b/glsa-201701-39.xml
index 83f18d08..83008000 100644
--- a/glsa-201701-39.xml
+++ b/glsa-201701-39.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5108">CVE-2016-5108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5108">CVE-2016-5108</uri>
</references>
<metadata tag="requester" timestamp="2017-01-15T19:15:46Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T03:38:25Z">b-man</metadata>
diff --git a/glsa-201701-40.xml b/glsa-201701-40.xml
index c02081bf..eb502930 100644
--- a/glsa-201701-40.xml
+++ b/glsa-201701-40.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765">
CVE-2014-9765
</uri>
</references>
diff --git a/glsa-201701-41.xml b/glsa-201701-41.xml
index 906c448e..0a9ddd6a 100644
--- a/glsa-201701-41.xml
+++ b/glsa-201701-41.xml
@@ -41,7 +41,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3985">CVE-2014-3985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3985">CVE-2014-3985</uri>
</references>
<metadata tag="requester" timestamp="2017-01-15T18:49:39Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T09:18:54Z">b-man</metadata>
diff --git a/glsa-201701-42.xml b/glsa-201701-42.xml
index 62517241..2f337fd4 100644
--- a/glsa-201701-42.xml
+++ b/glsa-201701-42.xml
@@ -48,10 +48,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9652">CVE-2014-9652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9653">CVE-2014-9653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9652">CVE-2014-9652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9653">CVE-2014-9653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
</references>
<metadata tag="requester" timestamp="2016-11-23T00:36:33Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T09:20:27Z">b-man</metadata>
diff --git a/glsa-201701-43.xml b/glsa-201701-43.xml
index 2fb4ac9e..75c5d8b2 100644
--- a/glsa-201701-43.xml
+++ b/glsa-201701-43.xml
@@ -58,21 +58,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
</references>
<metadata tag="requester" timestamp="2017-01-04T03:38:18Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T18:34:11Z">b-man</metadata>
diff --git a/glsa-201701-44.xml b/glsa-201701-44.xml
index 6836a1c7..653d4ce7 100644
--- a/glsa-201701-44.xml
+++ b/glsa-201701-44.xml
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0804">CVE-2012-0804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0804">CVE-2012-0804</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:43:18Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:06:48Z">b-man</metadata>
diff --git a/glsa-201701-45.xml b/glsa-201701-45.xml
index 62625cae..8282b542 100644
--- a/glsa-201701-45.xml
+++ b/glsa-201701-45.xml
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5193">CVE-2017-5193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5194">CVE-2017-5194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5195">CVE-2017-5195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5196">CVE-2017-5196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5193">CVE-2017-5193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5194">CVE-2017-5194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5195">CVE-2017-5195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5196">CVE-2017-5196</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:22:08Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:13:03Z">b-man</metadata>
diff --git a/glsa-201701-46.xml b/glsa-201701-46.xml
index f20c8f2c..152bd894 100644
--- a/glsa-201701-46.xml
+++ b/glsa-201701-46.xml
@@ -46,14 +46,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5285">CVE-2016-5285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8635">CVE-2016-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
- <uri link="http://www.mitls.org/pages/attacks/SLOTH">SLOTH Attack Technical
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5285">CVE-2016-5285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8635">CVE-2016-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
+ <uri link="https://www.mitls.org/pages/attacks/SLOTH">SLOTH Attack Technical
Paper
</uri>
</references>
diff --git a/glsa-201701-47.xml b/glsa-201701-47.xml
index 13ef6a00..395f6320 100644
--- a/glsa-201701-47.xml
+++ b/glsa-201701-47.xml
@@ -52,28 +52,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8150">CVE-2014-8150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8151">CVE-2014-8151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0755">CVE-2016-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3739">CVE-2016-3739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5419">CVE-2016-5419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5420">CVE-2016-5420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5421">CVE-2016-5421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7141">CVE-2016-7141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7167">CVE-2016-7167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8615">CVE-2016-8615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8616">CVE-2016-8616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8617">CVE-2016-8617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8618">CVE-2016-8618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8619">CVE-2016-8619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8620">CVE-2016-8620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8621">CVE-2016-8621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8622">CVE-2016-8622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8623">CVE-2016-8623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8624">CVE-2016-8624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8625">CVE-2016-8625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9586">CVE-2016-9586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9594">CVE-2016-9594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8150">CVE-2014-8150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8151">CVE-2014-8151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0755">CVE-2016-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3739">CVE-2016-3739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5419">CVE-2016-5419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5420">CVE-2016-5420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5421">CVE-2016-5421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7141">CVE-2016-7141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7167">CVE-2016-7167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8615">CVE-2016-8615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8616">CVE-2016-8616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8617">CVE-2016-8617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8618">CVE-2016-8618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8619">CVE-2016-8619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8620">CVE-2016-8620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8621">CVE-2016-8621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8622">CVE-2016-8622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8623">CVE-2016-8623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8624">CVE-2016-8624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8625">CVE-2016-8625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9586">CVE-2016-9586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9594">CVE-2016-9594</uri>
</references>
<metadata tag="requester" timestamp="2016-07-01T05:35:33Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:23:08Z">b-man</metadata>
diff --git a/glsa-201701-48.xml b/glsa-201701-48.xml
index c4c6e8a0..c96b85b8 100644
--- a/glsa-201701-48.xml
+++ b/glsa-201701-48.xml
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1245">CVE-2016-1245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4049">CVE-2016-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1245">CVE-2016-1245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4049">CVE-2016-4049</uri>
</references>
<metadata tag="requester" timestamp="2016-12-15T10:32:23Z">pinkbyte</metadata>
<metadata tag="submitter" timestamp="2017-01-21T05:46:06Z">whissi</metadata>
diff --git a/glsa-201701-49.xml b/glsa-201701-49.xml
index 7879ff8d..b5749bf9 100644
--- a/glsa-201701-49.xml
+++ b/glsa-201701-49.xml
@@ -52,23 +52,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10028">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10028">
CVE-2016-10028
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9101">CVE-2016-9101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9776">CVE-2016-9776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9845">CVE-2016-9845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9846">CVE-2016-9846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9907">CVE-2016-9907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9908">CVE-2016-9908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9911">CVE-2016-9911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9912">CVE-2016-9912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9913">CVE-2016-9913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9914">CVE-2016-9914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9915">CVE-2016-9915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9916">CVE-2016-9916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9921">CVE-2016-9921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9923">CVE-2016-9923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9101">CVE-2016-9101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9776">CVE-2016-9776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9845">CVE-2016-9845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9846">CVE-2016-9846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9907">CVE-2016-9907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9908">CVE-2016-9908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9911">CVE-2016-9911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9912">CVE-2016-9912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9913">CVE-2016-9913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9914">CVE-2016-9914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9915">CVE-2016-9915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9916">CVE-2016-9916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9921">CVE-2016-9921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9923">CVE-2016-9923</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T23:01:11Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:01:17Z">b-man</metadata>
diff --git a/glsa-201701-50.xml b/glsa-201701-50.xml
index 5cee7984..0c461ad3 100644
--- a/glsa-201701-50.xml
+++ b/glsa-201701-50.xml
@@ -39,7 +39,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3310">CVE-2015-3310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3310">CVE-2015-3310</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T22:55:39Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:15:31Z">b-man</metadata>
diff --git a/glsa-201701-51.xml b/glsa-201701-51.xml
index 48357104..3b4ca79b 100644
--- a/glsa-201701-51.xml
+++ b/glsa-201701-51.xml
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8949">CVE-2015-8949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1246">CVE-2016-1246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1249">CVE-2016-1249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1251">CVE-2016-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8949">CVE-2015-8949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1246">CVE-2016-1246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1249">CVE-2016-1249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1251">CVE-2016-1251</uri>
</references>
<metadata tag="requester" timestamp="2017-01-22T09:49:40Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:20:17Z">b-man</metadata>
diff --git a/glsa-201701-52.xml b/glsa-201701-52.xml
index 140c40fc..91eede39 100644
--- a/glsa-201701-52.xml
+++ b/glsa-201701-52.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6255">CVE-2016-6255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8863">CVE-2016-8863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6255">CVE-2016-6255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8863">CVE-2016-8863</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T08:52:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:28:22Z">b-man</metadata>
diff --git a/glsa-201701-53.xml b/glsa-201701-53.xml
index 5dac963b..85a4c309 100644
--- a/glsa-201701-53.xml
+++ b/glsa-201701-53.xml
@@ -46,7 +46,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5461">CVE-2014-5461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5461">CVE-2014-5461</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T10:51:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:32:26Z">b-man</metadata>
diff --git a/glsa-201701-54.xml b/glsa-201701-54.xml
index 6a1c4c21..1cb8d785 100644
--- a/glsa-201701-54.xml
+++ b/glsa-201701-54.xml
@@ -39,7 +39,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:16:14Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:34:47Z">b-man</metadata>
diff --git a/glsa-201701-55.xml b/glsa-201701-55.xml
index 618bc533..f5669454 100644
--- a/glsa-201701-55.xml
+++ b/glsa-201701-55.xml
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2977">CVE-2014-2977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2978">CVE-2014-2978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2977">CVE-2014-2977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2978">CVE-2014-2978</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:12:23Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:38:25Z">b-man</metadata>
diff --git a/glsa-201701-56.xml b/glsa-201701-56.xml
index 5e954de1..3cd908a3 100644
--- a/glsa-201701-56.xml
+++ b/glsa-201701-56.xml
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9840">CVE-2016-9840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9841">CVE-2016-9841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9842">CVE-2016-9842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9843">CVE-2016-9843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9840">CVE-2016-9840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9841">CVE-2016-9841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9842">CVE-2016-9842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9843">CVE-2016-9843</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T18:59:28Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:40:28Z">b-man</metadata>
diff --git a/glsa-201701-57.xml b/glsa-201701-57.xml
index d653fddf..3495ac78 100644
--- a/glsa-201701-57.xml
+++ b/glsa-201701-57.xml
@@ -42,13 +42,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433">CVE-2011-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764">CVE-2011-0764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552">CVE-2011-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553">CVE-2011-1553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554">CVE-2011-1554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244">CVE-2011-5244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433">CVE-2011-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764">CVE-2011-0764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552">CVE-2011-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553">CVE-2011-1553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554">CVE-2011-1554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244">CVE-2011-5244</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T03:19:11Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T22:39:53Z">b-man</metadata>
diff --git a/glsa-201701-58.xml b/glsa-201701-58.xml
index dad26e86..d0982f2b 100644
--- a/glsa-201701-58.xml
+++ b/glsa-201701-58.xml
@@ -50,9 +50,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6293">CVE-2016-6293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7415">CVE-2016-7415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6293">CVE-2016-6293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7415">CVE-2016-7415</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T18:37:12Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-24T10:46:19Z">b-man</metadata>
diff --git a/glsa-201701-59.xml b/glsa-201701-59.xml
index 6841f0f1..4e6646d9 100644
--- a/glsa-201701-59.xml
+++ b/glsa-201701-59.xml
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4855">CVE-2016-4855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7405">CVE-2016-7405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4855">CVE-2016-4855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7405">CVE-2016-7405</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T23:56:54Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-24T10:50:50Z">b-man</metadata>
diff --git a/glsa-201701-60.xml b/glsa-201701-60.xml
index 6ce4f6c8..847905cc 100644
--- a/glsa-201701-60.xml
+++ b/glsa-201701-60.xml
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8366">CVE-2015-8366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8367">CVE-2015-8367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8366">CVE-2015-8366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8367">CVE-2015-8367</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:14:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-04-30T20:28:16Z">b-man</metadata>
diff --git a/glsa-201701-61.xml b/glsa-201701-61.xml
index cfac3b14..d97ed757 100644
--- a/glsa-201701-61.xml
+++ b/glsa-201701-61.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085">CVE-2016-9085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085">CVE-2016-9085</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T08:48:39Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-24T11:09:59Z">b-man</metadata>
diff --git a/glsa-201701-62.xml b/glsa-201701-62.xml
index e3c9c3e8..2bfdf8cf 100644
--- a/glsa-201701-62.xml
+++ b/glsa-201701-62.xml
@@ -55,9 +55,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5180">CVE-2017-5180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5206">CVE-2017-5206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5207">CVE-2017-5207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5180">CVE-2017-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5206">CVE-2017-5206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5207">CVE-2017-5207</uri>
</references>
<metadata tag="requester" timestamp="2017-01-13T15:06:51Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-31T03:41:42Z">whissi</metadata>
diff --git a/glsa-201701-63.xml b/glsa-201701-63.xml
index 82e8f8ee..f193a72e 100644
--- a/glsa-201701-63.xml
+++ b/glsa-201701-63.xml
@@ -45,24 +45,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
</references>
<metadata tag="requester" timestamp="2016-06-30T12:16:41Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-24T16:36:53Z">b-man</metadata>
diff --git a/glsa-201701-64.xml b/glsa-201701-64.xml
index d70eea66..8a53cfd8 100644
--- a/glsa-201701-64.xml
+++ b/glsa-201701-64.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6424">CVE-2013-6424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3164">CVE-2015-3164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418">CVE-2015-3418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6424">CVE-2013-6424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3164">CVE-2015-3164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418">CVE-2015-3418</uri>
<uri link="https://lists.x.org/archives/xorg-announce/2015-June/002611.html">
X.Org/Wayland Security Advisory: Missing authentication in XWayland
</uri>
diff --git a/glsa-201701-65.xml b/glsa-201701-65.xml
index fca9268f..713317d4 100644
--- a/glsa-201701-65.xml
+++ b/glsa-201701-65.xml
@@ -61,24 +61,24 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
- <uri link="http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
+ <uri link="https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA">
Oracle Critical Patch Update Advisory - January 2017
</uri>
</references>
diff --git a/glsa-201701-66.xml b/glsa-201701-66.xml
index 7edf7d60..82067959 100644
--- a/glsa-201701-66.xml
+++ b/glsa-201701-66.xml
@@ -47,27 +47,27 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5006">CVE-2017-5006</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5007">CVE-2017-5007</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5008">CVE-2017-5008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5009">CVE-2017-5009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5010">CVE-2017-5010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5011">CVE-2017-5011</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5012">CVE-2017-5012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5013">CVE-2017-5013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5014">CVE-2017-5014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5015">CVE-2017-5015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5016">CVE-2017-5016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5017">CVE-2017-5017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5018">CVE-2017-5018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5019">CVE-2017-5019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5020">CVE-2017-5020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5021">CVE-2017-5021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5022">CVE-2017-5022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5023">CVE-2017-5023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5026">CVE-2017-5026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5006">CVE-2017-5006</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5007">CVE-2017-5007</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5008">CVE-2017-5008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5009">CVE-2017-5009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5010">CVE-2017-5010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5011">CVE-2017-5011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5012">CVE-2017-5012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5013">CVE-2017-5013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5014">CVE-2017-5014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5015">CVE-2017-5015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5016">CVE-2017-5016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5017">CVE-2017-5017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5018">CVE-2017-5018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5019">CVE-2017-5019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5020">CVE-2017-5020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5021">CVE-2017-5021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5022">CVE-2017-5022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5023">CVE-2017-5023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5026">CVE-2017-5026</uri>
</references>
<metadata tag="requester" timestamp="2017-01-28T01:28:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T01:03:18Z">b-man</metadata>
diff --git a/glsa-201701-67.xml b/glsa-201701-67.xml
index c88f32dd..291841a5 100644
--- a/glsa-201701-67.xml
+++ b/glsa-201701-67.xml
@@ -40,7 +40,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466">CVE-2014-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466">CVE-2014-0466</uri>
</references>
<metadata tag="requester" timestamp="2017-01-24T18:44:55Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:07:45Z">b-man</metadata>
diff --git a/glsa-201701-68.xml b/glsa-201701-68.xml
index 08fa57fe..7dc06303 100644
--- a/glsa-201701-68.xml
+++ b/glsa-201701-68.xml
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0852">CVE-2015-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5684">CVE-2016-5684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0852">CVE-2015-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5684">CVE-2016-5684</uri>
</references>
<metadata tag="requester" timestamp="2017-01-23T08:24:46Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:12:52Z">b-man</metadata>
diff --git a/glsa-201701-69.xml b/glsa-201701-69.xml
index 0d034abb..3dd82eae 100644
--- a/glsa-201701-69.xml
+++ b/glsa-201701-69.xml
@@ -47,7 +47,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5330">CVE-2017-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5330">CVE-2017-5330</uri>
</references>
<metadata tag="requester" timestamp="2017-01-20T15:24:35Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:19:07Z">b-man</metadata>
diff --git a/glsa-201701-70.xml b/glsa-201701-70.xml
index aba6fd53..8ffcf0f7 100644
--- a/glsa-201701-70.xml
+++ b/glsa-201701-70.xml
@@ -47,7 +47,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410">CVE-2016-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410">CVE-2016-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-01-04T03:14:04Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:21:27Z">b-man</metadata>
diff --git a/glsa-201701-71.xml b/glsa-201701-71.xml
index 1d55b382..a758c35b 100644
--- a/glsa-201701-71.xml
+++ b/glsa-201701-71.xml
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7122">CVE-2016-7122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7450">CVE-2016-7450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7502">CVE-2016-7502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7555">CVE-2016-7555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7562">CVE-2016-7562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7785">CVE-2016-7785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7905">CVE-2016-7905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7122">CVE-2016-7122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7450">CVE-2016-7450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7502">CVE-2016-7502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7555">CVE-2016-7555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7562">CVE-2016-7562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7785">CVE-2016-7785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7905">CVE-2016-7905</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T09:23:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:22:37Z">b-man</metadata>
diff --git a/glsa-201701-72.xml b/glsa-201701-72.xml
index d0c052d5..521693e0 100644
--- a/glsa-201701-72.xml
+++ b/glsa-201701-72.xml
@@ -46,7 +46,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10164">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10164">
CVE-2016-10164
</uri>
</references>
diff --git a/glsa-201701-73.xml b/glsa-201701-73.xml
index e8cbde4b..2cf65825 100644
--- a/glsa-201701-73.xml
+++ b/glsa-201701-73.xml
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4645">CVE-2015-4645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4646">CVE-2015-4646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4645">CVE-2015-4645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4646">CVE-2015-4646</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T10:43:44Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:58:33Z">b-man</metadata>
diff --git a/glsa-201701-74.xml b/glsa-201701-74.xml
index 69fd1fdb..c72bc9ff 100644
--- a/glsa-201701-74.xml
+++ b/glsa-201701-74.xml
@@ -63,7 +63,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10087">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10087">
CVE-2016-10087
</uri>
</references>
diff --git a/glsa-201701-75.xml b/glsa-201701-75.xml
index d4de61e9..2d59364e 100644
--- a/glsa-201701-75.xml
+++ b/glsa-201701-75.xml
@@ -51,11 +51,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8853">CVE-2015-8853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8853">CVE-2015-8853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
<uri link="https://wiki.gentoo.org/wiki/Perl#Upgrading_.28major_version.29">
Gentoo Wiki: How to upgrade Perl
</uri>
diff --git a/glsa-201701-76.xml b/glsa-201701-76.xml
index c5e51f9b..ebe27219 100644
--- a/glsa-201701-76.xml
+++ b/glsa-201701-76.xml
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8947">CVE-2015-8947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2052">CVE-2016-2052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8947">CVE-2015-8947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2052">CVE-2016-2052</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T02:23:28Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-31T12:22:13Z">b-man</metadata>
diff --git a/glsa-201701-77.xml b/glsa-201701-77.xml
index 7f445efe..e70f0e6f 100644
--- a/glsa-201701-77.xml
+++ b/glsa-201701-77.xml
@@ -52,7 +52,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9587">CVE-2016-9587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9587">CVE-2016-9587</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:33:48Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-31T15:20:20Z">whissi</metadata>
diff --git a/glsa-201702-01.xml b/glsa-201702-01.xml
index f4ac29e4..574a1ba7 100644
--- a/glsa-201702-01.xml
+++ b/glsa-201702-01.xml
@@ -50,7 +50,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10109">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10109">
CVE-2016-10109
</uri>
</references>
diff --git a/glsa-201702-03.xml b/glsa-201702-03.xml
index 5a9e9a39..a2e01995 100644
--- a/glsa-201702-03.xml
+++ b/glsa-201702-03.xml
@@ -56,7 +56,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5940">CVE-2017-5940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5940">CVE-2017-5940</uri>
<uri link="https://firejail.wordpress.com/download-2/release-notes/">
Firejail Release Notes
</uri>
diff --git a/glsa-201702-04.xml b/glsa-201702-04.xml
index e4dfe1c2..47918d93 100644
--- a/glsa-201702-04.xml
+++ b/glsa-201702-04.xml
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5334">CVE-2017-5334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5335">CVE-2017-5335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5336">CVE-2017-5336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5337">CVE-2017-5337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5334">CVE-2017-5334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5335">CVE-2017-5335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5336">CVE-2017-5336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5337">CVE-2017-5337</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:21:19Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:04:35Z">whissi</metadata>
diff --git a/glsa-201702-05.xml b/glsa-201702-05.xml
index 4fa1682e..fbb7d90b 100644
--- a/glsa-201702-05.xml
+++ b/glsa-201702-05.xml
@@ -40,7 +40,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990">CVE-2014-8990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990">CVE-2014-8990</uri>
</references>
<metadata tag="requester" timestamp="2017-02-01T09:30:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:08:07Z">whissi</metadata>
diff --git a/glsa-201702-06.xml b/glsa-201702-06.xml
index ba184707..78ceefb5 100644
--- a/glsa-201702-06.xml
+++ b/glsa-201702-06.xml
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978">CVE-2014-0978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1235">CVE-2014-1235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236">CVE-2014-1236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978">CVE-2014-0978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1235">CVE-2014-1235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236">CVE-2014-1236</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:53:41Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:14:56Z">b-man</metadata>
diff --git a/glsa-201702-07.xml b/glsa-201702-07.xml
index aef31154..a065dfd2 100644
--- a/glsa-201702-07.xml
+++ b/glsa-201702-07.xml
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055">CVE-2016-7055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730">CVE-2017-3730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731">CVE-2017-3731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732">CVE-2017-3732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055">CVE-2016-7055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730">CVE-2017-3730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731">CVE-2017-3731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732">CVE-2017-3732</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T01:30:38Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-14T12:34:58Z">whissi</metadata>
diff --git a/glsa-201702-08.xml b/glsa-201702-08.xml
index 6e25cc50..acd38bb2 100644
--- a/glsa-201702-08.xml
+++ b/glsa-201702-08.xml
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5545">CVE-2016-5545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3290">CVE-2017-3290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3316">CVE-2017-3316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3332">CVE-2017-3332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5545">CVE-2016-5545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3290">CVE-2017-3290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3316">CVE-2017-3316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3332">CVE-2017-3332</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T02:06:40Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-14T12:37:26Z">whissi</metadata>
diff --git a/glsa-201702-09.xml b/glsa-201702-09.xml
index 307978df..e5033cc4 100644
--- a/glsa-201702-09.xml
+++ b/glsa-201702-09.xml
@@ -45,22 +45,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10144">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10144">
CVE-2016-10144
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10145">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10145">
CVE-2016-10145
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10146">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10146">
CVE-2016-10146
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9298">CVE-2016-9298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5506">CVE-2017-5506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5507">CVE-2017-5507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5508">CVE-2017-5508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5509">CVE-2017-5509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5510">CVE-2017-5510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5511">CVE-2017-5511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9298">CVE-2016-9298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5506">CVE-2017-5506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5507">CVE-2017-5507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5508">CVE-2017-5508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5509">CVE-2017-5509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5510">CVE-2017-5510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5511">CVE-2017-5511</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T00:45:48Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-17T08:09:06Z">b-man</metadata>
diff --git a/glsa-201702-10.xml b/glsa-201702-10.xml
index fb897b8a..8d98b2c5 100644
--- a/glsa-201702-10.xml
+++ b/glsa-201702-10.xml
@@ -49,7 +49,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0358">CVE-2017-0358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0358">CVE-2017-0358</uri>
<uri link="https://security.gentoo.org/glsa/201603-04">GLSA-201603-04</uri>
<uri link="https://security.gentoo.org/glsa/201701-19">GLSA-201701-19</uri>
</references>
diff --git a/glsa-201702-11.xml b/glsa-201702-11.xml
index 985ae38e..06b17eed 100644
--- a/glsa-201702-11.xml
+++ b/glsa-201702-11.xml
@@ -49,14 +49,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9761">CVE-2014-9761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5277">CVE-2015-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8777">CVE-2015-8777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1234">CVE-2016-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3075">CVE-2016-3075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9761">CVE-2014-9761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5277">CVE-2015-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8777">CVE-2015-8777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1234">CVE-2016-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3075">CVE-2016-3075</uri>
</references>
<metadata tag="requester" timestamp="2016-11-29T21:44:07Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-19T12:31:09Z">whissi</metadata>
diff --git a/glsa-201702-12.xml b/glsa-201702-12.xml
index 4825141f..a2459fc9 100644
--- a/glsa-201702-12.xml
+++ b/glsa-201702-12.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265">CVE-2016-6265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525">CVE-2016-6525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896">CVE-2017-5896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265">CVE-2016-6265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525">CVE-2016-6525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896">CVE-2017-5896</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:42:31Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-19T12:47:00Z">whissi</metadata>
diff --git a/glsa-201702-13.xml b/glsa-201702-13.xml
index a4eb178f..52e6b518 100644
--- a/glsa-201702-13.xml
+++ b/glsa-201702-13.xml
@@ -58,14 +58,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
<uri link="https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/">
Mozilla Foundation Security Advisory 2017-03
</uri>
diff --git a/glsa-201702-14.xml b/glsa-201702-14.xml
index a4a873ea..723fea7b 100644
--- a/glsa-201702-14.xml
+++ b/glsa-201702-14.xml
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7459">CVE-2013-7459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7459">CVE-2013-7459</uri>
</references>
<metadata tag="requester" timestamp="2017-02-06T00:09:22Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:17:13Z">whissi</metadata>
diff --git a/glsa-201702-15.xml b/glsa-201702-15.xml
index 4fd87986..a7eb0bd9 100644
--- a/glsa-201702-15.xml
+++ b/glsa-201702-15.xml
@@ -59,7 +59,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8869">CVE-2015-8869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8869">CVE-2015-8869</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T00:59:45Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:19:06Z">whissi</metadata>
diff --git a/glsa-201702-16.xml b/glsa-201702-16.xml
index ff922abe..672a49a0 100644
--- a/glsa-201702-16.xml
+++ b/glsa-201702-16.xml
@@ -54,9 +54,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4335">CVE-2015-4335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8080">CVE-2015-8080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8339">CVE-2016-8339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4335">CVE-2015-4335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8080">CVE-2015-8080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8339">CVE-2016-8339</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T02:05:41Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:26:41Z">whissi</metadata>
diff --git a/glsa-201702-17.xml b/glsa-201702-17.xml
index 4e34e47d..d2ed6076 100644
--- a/glsa-201702-17.xml
+++ b/glsa-201702-17.xml
@@ -44,24 +44,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8318">CVE-2016-8318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8327">CVE-2016-8327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3251">CVE-2017-3251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3256">CVE-2017-3256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3273">CVE-2017-3273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3313">CVE-2017-3313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3319">CVE-2017-3319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3320">CVE-2017-3320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8318">CVE-2016-8318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8327">CVE-2016-8327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3251">CVE-2017-3251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3256">CVE-2017-3256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3273">CVE-2017-3273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3313">CVE-2017-3313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3319">CVE-2017-3319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3320">CVE-2017-3320</uri>
<uri link="https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL">
Oracle Critical Patch Update Advisory - January 2017
</uri>
diff --git a/glsa-201702-18.xml b/glsa-201702-18.xml
index 3378018f..f0ab3c69 100644
--- a/glsa-201702-18.xml
+++ b/glsa-201702-18.xml
@@ -42,17 +42,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6664">CVE-2016-6664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6664">CVE-2016-6664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T00:33:47Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:27:31Z">whissi</metadata>
diff --git a/glsa-201702-19.xml b/glsa-201702-19.xml
index e797b5a3..0a3c0fcc 100644
--- a/glsa-201702-19.xml
+++ b/glsa-201702-19.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5581">CVE-2017-5581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5581">CVE-2017-5581</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T02:16:26Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:29:04Z">whissi</metadata>
diff --git a/glsa-201702-20.xml b/glsa-201702-20.xml
index c1e13ce4..73ca0dd6 100644
--- a/glsa-201702-20.xml
+++ b/glsa-201702-20.xml
@@ -45,32 +45,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2925">CVE-2017-2925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2926">CVE-2017-2926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2927">CVE-2017-2927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2928">CVE-2017-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2930">CVE-2017-2930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2931">CVE-2017-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2932">CVE-2017-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2933">CVE-2017-2933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2934">CVE-2017-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2935">CVE-2017-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2936">CVE-2017-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2937">CVE-2017-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2938">CVE-2017-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2982">CVE-2017-2982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2984">CVE-2017-2984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2985">CVE-2017-2985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2986">CVE-2017-2986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2987">CVE-2017-2987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2988">CVE-2017-2988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2990">CVE-2017-2990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2991">CVE-2017-2991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2992">CVE-2017-2992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2993">CVE-2017-2993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2994">CVE-2017-2994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2995">CVE-2017-2995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2996">CVE-2017-2996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2925">CVE-2017-2925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2926">CVE-2017-2926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2927">CVE-2017-2927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2928">CVE-2017-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2930">CVE-2017-2930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2931">CVE-2017-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2932">CVE-2017-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2933">CVE-2017-2933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2934">CVE-2017-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2935">CVE-2017-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2936">CVE-2017-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2937">CVE-2017-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2938">CVE-2017-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2982">CVE-2017-2982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2984">CVE-2017-2984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2985">CVE-2017-2985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2986">CVE-2017-2986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2987">CVE-2017-2987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2988">CVE-2017-2988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2990">CVE-2017-2990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2991">CVE-2017-2991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2992">CVE-2017-2992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2993">CVE-2017-2993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2994">CVE-2017-2994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2995">CVE-2017-2995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2996">CVE-2017-2996</uri>
</references>
<metadata tag="requester" timestamp="2017-02-16T12:43:25Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:44:37Z">whissi</metadata>
diff --git a/glsa-201702-21.xml b/glsa-201702-21.xml
index 68f1a9b4..24f3ab72 100644
--- a/glsa-201702-21.xml
+++ b/glsa-201702-21.xml
@@ -58,7 +58,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381">CVE-2017-0381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381">CVE-2017-0381</uri>
<uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851612#10">
Debian Bug 851612
</uri>
diff --git a/glsa-201702-22.xml b/glsa-201702-22.xml
index b18c72c2..4cb137bc 100644
--- a/glsa-201702-22.xml
+++ b/glsa-201702-22.xml
@@ -56,15 +56,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5386">CVE-2017-5386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5386">CVE-2017-5386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
<uri link="https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/">
Mozilla Foundation Security Advisory 2017-02
</uri>
diff --git a/glsa-201702-23.xml b/glsa-201702-23.xml
index 4eae1027..9fe21292 100644
--- a/glsa-201702-23.xml
+++ b/glsa-201702-23.xml
@@ -51,10 +51,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7406">CVE-2016-7406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7407">CVE-2016-7407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7408">CVE-2016-7408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7409">CVE-2016-7409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7406">CVE-2016-7406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7407">CVE-2016-7407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7408">CVE-2016-7408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7409">CVE-2016-7409</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:53:36Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:45:39Z">whissi</metadata>
diff --git a/glsa-201702-24.xml b/glsa-201702-24.xml
index 1e92964d..51946bf0 100644
--- a/glsa-201702-24.xml
+++ b/glsa-201702-24.xml
@@ -49,8 +49,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9941">CVE-2016-9941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9942">CVE-2016-9942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9941">CVE-2016-9941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9942">CVE-2016-9942</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:55:00Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:45:56Z">whissi</metadata>
diff --git a/glsa-201702-25.xml b/glsa-201702-25.xml
index 0cedc9ab..3824c1d4 100644
--- a/glsa-201702-25.xml
+++ b/glsa-201702-25.xml
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7969">CVE-2016-7969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7970">CVE-2016-7970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7971">CVE-2016-7971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7972">CVE-2016-7972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7969">CVE-2016-7969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7970">CVE-2016-7970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7971">CVE-2016-7971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7972">CVE-2016-7972</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T23:35:59Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:46:16Z">whissi</metadata>
diff --git a/glsa-201702-26.xml b/glsa-201702-26.xml
index fc86cf20..5dfa551d 100644
--- a/glsa-201702-26.xml
+++ b/glsa-201702-26.xml
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4796">CVE-2008-4796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7313">CVE-2008-7313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8641">CVE-2016-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9565">CVE-2016-9565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4796">CVE-2008-4796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7313">CVE-2008-7313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8641">CVE-2016-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9565">CVE-2016-9565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:56:03Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:04:00Z">b-man</metadata>
diff --git a/glsa-201702-27.xml b/glsa-201702-27.xml
index e65aec7e..b09594b3 100644
--- a/glsa-201702-27.xml
+++ b/glsa-201702-27.xml
@@ -56,7 +56,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
<uri link="https://xenbits.xen.org/xsa/advisory-207.html">XSA-207</uri>
<uri link="https://xenbits.xen.org/xsa/advisory-208.html">XSA-208</uri>
</references>
diff --git a/glsa-201702-28.xml b/glsa-201702-28.xml
index dc8de749..b7f51361 100644
--- a/glsa-201702-28.xml
+++ b/glsa-201702-28.xml
@@ -53,19 +53,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10155">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10155">
CVE-2016-10155
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5525">CVE-2017-5525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5552">CVE-2017-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5578">CVE-2017-5578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5579">CVE-2017-5579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5667">CVE-2017-5667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5856">CVE-2017-5856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5857">CVE-2017-5857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5898">CVE-2017-5898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5931">CVE-2017-5931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5525">CVE-2017-5525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5552">CVE-2017-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5578">CVE-2017-5578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5579">CVE-2017-5579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5667">CVE-2017-5667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5856">CVE-2017-5856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5857">CVE-2017-5857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5898">CVE-2017-5898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5931">CVE-2017-5931</uri>
</references>
<metadata tag="requester" timestamp="2017-02-16T18:41:09Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:04:45Z">whissi</metadata>
diff --git a/glsa-201702-29.xml b/glsa-201702-29.xml
index d6e26f8a..e5fbed59 100644
--- a/glsa-201702-29.xml
+++ b/glsa-201702-29.xml
@@ -45,19 +45,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10158">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10158">
CVE-2016-10158
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10159">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10159">
CVE-2016-10159
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10160">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10160">
CVE-2016-10160
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10161">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10161">
CVE-2016-10161
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9935">CVE-2016-9935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9935">CVE-2016-9935</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T23:06:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:05:07Z">whissi</metadata>
diff --git a/glsa-201702-30.xml b/glsa-201702-30.xml
index 6c9705d5..f831214f 100644
--- a/glsa-201702-30.xml
+++ b/glsa-201702-30.xml
@@ -42,47 +42,47 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7922">CVE-2016-7922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7923">CVE-2016-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7924">CVE-2016-7924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7925">CVE-2016-7925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7926">CVE-2016-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7927">CVE-2016-7927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7928">CVE-2016-7928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7929">CVE-2016-7929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7930">CVE-2016-7930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7931">CVE-2016-7931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7932">CVE-2016-7932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7933">CVE-2016-7933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7934">CVE-2016-7934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7935">CVE-2016-7935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7936">CVE-2016-7936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7937">CVE-2016-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7938">CVE-2016-7938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7939">CVE-2016-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7940">CVE-2016-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7973">CVE-2016-7973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7974">CVE-2016-7974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7975">CVE-2016-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7983">CVE-2016-7983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7984">CVE-2016-7984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7985">CVE-2016-7985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7986">CVE-2016-7986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7992">CVE-2016-7992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7993">CVE-2016-7993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8574">CVE-2016-8574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8575">CVE-2016-8575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5202">CVE-2017-5202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5203">CVE-2017-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5204">CVE-2017-5204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5205">CVE-2017-5205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5341">CVE-2017-5341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5342">CVE-2017-5342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5482">CVE-2017-5482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5483">CVE-2017-5483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5484">CVE-2017-5484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5485">CVE-2017-5485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5486">CVE-2017-5486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7922">CVE-2016-7922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7923">CVE-2016-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7924">CVE-2016-7924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7925">CVE-2016-7925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7926">CVE-2016-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7927">CVE-2016-7927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7928">CVE-2016-7928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7929">CVE-2016-7929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7930">CVE-2016-7930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7931">CVE-2016-7931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7932">CVE-2016-7932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7933">CVE-2016-7933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7934">CVE-2016-7934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7935">CVE-2016-7935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7936">CVE-2016-7936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7937">CVE-2016-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7938">CVE-2016-7938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7939">CVE-2016-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7940">CVE-2016-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7973">CVE-2016-7973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7974">CVE-2016-7974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7975">CVE-2016-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7983">CVE-2016-7983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7984">CVE-2016-7984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7985">CVE-2016-7985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7986">CVE-2016-7986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7992">CVE-2016-7992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7993">CVE-2016-7993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8574">CVE-2016-8574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8575">CVE-2016-8575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5202">CVE-2017-5202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5203">CVE-2017-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5204">CVE-2017-5204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5205">CVE-2017-5205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5341">CVE-2017-5341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5342">CVE-2017-5342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5482">CVE-2017-5482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5483">CVE-2017-5483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5484">CVE-2017-5484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5485">CVE-2017-5485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5486">CVE-2017-5486</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:50:53Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:35:31Z">whissi</metadata>
diff --git a/glsa-201702-31.xml b/glsa-201702-31.xml
index f0a15478..80178bb5 100644
--- a/glsa-201702-31.xml
+++ b/glsa-201702-31.xml
@@ -50,11 +50,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7976">CVE-2016-7976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7977">CVE-2016-7977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7978">CVE-2016-7978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7979">CVE-2016-7979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8602">CVE-2016-8602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7976">CVE-2016-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7977">CVE-2016-7977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7978">CVE-2016-7978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7979">CVE-2016-7979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8602">CVE-2016-8602</uri>
<uri link="https://security.gentoo.org/glsa/201612-26">GLSA-201612-26</uri>
</references>
<metadata tag="requester" timestamp="2017-02-21T18:24:37Z">whissi</metadata>
diff --git a/glsa-201702-32.xml b/glsa-201702-32.xml
index 6baab55c..38c9a049 100644
--- a/glsa-201702-32.xml
+++ b/glsa-201702-32.xml
@@ -48,7 +48,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10173">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10173">
CVE-2016-10173
</uri>
</references>
diff --git a/glsa-201703-01.xml b/glsa-201703-01.xml
index 49601e99..1a548147 100644
--- a/glsa-201703-01.xml
+++ b/glsa-201703-01.xml
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1513">CVE-2016-1513</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0051/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1513">CVE-2016-1513</uri>
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0051/">
TALOS-2016-0051
</uri>
</references>
diff --git a/glsa-201703-02.xml b/glsa-201703-02.xml
index 06cb24e4..1894cc54 100644
--- a/glsa-201703-02.xml
+++ b/glsa-201703-02.xml
@@ -48,13 +48,13 @@
<uri link="https://helpx.adobe.com/security/products/flash-player/apsb17-07.html">
APSB17-07
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2997">CVE-2017-2997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2998">CVE-2017-2998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2999">CVE-2017-2999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3000">CVE-2017-3000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3001">CVE-2017-3001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3002">CVE-2017-3002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3003">CVE-2017-3003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2997">CVE-2017-2997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2998">CVE-2017-2998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2999">CVE-2017-2999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3000">CVE-2017-3000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3001">CVE-2017-3001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3002">CVE-2017-3002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3003">CVE-2017-3003</uri>
</references>
<metadata tag="requester" timestamp="2017-03-16T08:44:22Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-03-19T18:32:52Z">whissi</metadata>
diff --git a/glsa-201703-03.xml b/glsa-201703-03.xml
index 8d4c2a92..e9c45761 100644
--- a/glsa-201703-03.xml
+++ b/glsa-201703-03.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T21:53:38Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-19T18:47:02Z">BlueKnight</metadata>
diff --git a/glsa-201703-04.xml b/glsa-201703-04.xml
index 0ca2ad31..f62acea4 100644
--- a/glsa-201703-04.xml
+++ b/glsa-201703-04.xml
@@ -53,7 +53,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2629">CVE-2017-2629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2629">CVE-2017-2629</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T21:41:04Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-28T01:57:09Z">whissi</metadata>
diff --git a/glsa-201703-05.xml b/glsa-201703-05.xml
index 27d2040b..c817f87b 100644
--- a/glsa-201703-05.xml
+++ b/glsa-201703-05.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4008">CVE-2016-4008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4008">CVE-2016-4008</uri>
</references>
<metadata tag="requester" timestamp="2017-02-22T11:00:00Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-03-28T02:54:28Z">whissi</metadata>
diff --git a/glsa-201703-06.xml b/glsa-201703-06.xml
index 8459b134..1ff9b93d 100644
--- a/glsa-201703-06.xml
+++ b/glsa-201703-06.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7178">CVE-2017-7178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7178">CVE-2017-7178</uri>
</references>
<metadata tag="requester" timestamp="2017-03-18T12:56:30Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-03-28T03:08:19Z">whissi</metadata>
diff --git a/glsa-201703-07.xml b/glsa-201703-07.xml
index de0af87a..fd225903 100644
--- a/glsa-201703-07.xml
+++ b/glsa-201703-07.xml
@@ -56,7 +56,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
</references>
<metadata tag="requester" timestamp="2017-02-24T02:24:45Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-28T03:15:18Z">whissi</metadata>
diff --git a/glsa-201704-01.xml b/glsa-201704-01.xml
index a06e4cbc..8a63051e 100644
--- a/glsa-201704-01.xml
+++ b/glsa-201704-01.xml
@@ -51,13 +51,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9602">CVE-2016-9602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2630">CVE-2017-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5973">CVE-2017-5973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5987">CVE-2017-5987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6058">CVE-2017-6058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6505">CVE-2017-6505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9602">CVE-2016-9602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2630">CVE-2017-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5973">CVE-2017-5973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5987">CVE-2017-5987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6058">CVE-2017-6058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6505">CVE-2017-6505</uri>
</references>
<metadata tag="requester" timestamp="2017-03-28T03:29:39Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-10T21:20:32Z">BlueKnight</metadata>
diff --git a/glsa-201704-02.xml b/glsa-201704-02.xml
index 345a6f29..5c5a804c 100644
--- a/glsa-201704-02.xml
+++ b/glsa-201704-02.xml
@@ -46,28 +46,28 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5030">CVE-2017-5030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5031">CVE-2017-5031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5032">CVE-2017-5032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5033">CVE-2017-5033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5034">CVE-2017-5034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5035">CVE-2017-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5036">CVE-2017-5036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5037">CVE-2017-5037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5038">CVE-2017-5038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5039">CVE-2017-5039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5040">CVE-2017-5040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5041">CVE-2017-5041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5042">CVE-2017-5042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5043">CVE-2017-5043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5044">CVE-2017-5044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5045">CVE-2017-5045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5046">CVE-2017-5046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5052">CVE-2017-5052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5053">CVE-2017-5053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5054">CVE-2017-5054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5055">CVE-2017-5055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5056">CVE-2017-5056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5030">CVE-2017-5030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5031">CVE-2017-5031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5032">CVE-2017-5032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5033">CVE-2017-5033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5034">CVE-2017-5034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5035">CVE-2017-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5036">CVE-2017-5036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5037">CVE-2017-5037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5038">CVE-2017-5038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5039">CVE-2017-5039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5040">CVE-2017-5040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5041">CVE-2017-5041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5042">CVE-2017-5042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5043">CVE-2017-5043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5044">CVE-2017-5044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5045">CVE-2017-5045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5046">CVE-2017-5046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5052">CVE-2017-5052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5053">CVE-2017-5053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5054">CVE-2017-5054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5055">CVE-2017-5055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5056">CVE-2017-5056</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:37:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-14T15:04:47Z">BlueKnight</metadata>
diff --git a/glsa-201704-03.xml b/glsa-201704-03.xml
index b8e18bb3..d37b9e45 100644
--- a/glsa-201704-03.xml
+++ b/glsa-201704-03.xml
@@ -124,20 +124,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5407">CVE-2016-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7942">CVE-2016-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7943">CVE-2016-7943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7944">CVE-2016-7944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7945">CVE-2016-7945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7946">CVE-2016-7946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7947">CVE-2016-7947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7948">CVE-2016-7948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7949">CVE-2016-7949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7950">CVE-2016-7950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7953">CVE-2016-7953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2624">CVE-2017-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2625">CVE-2017-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2626">CVE-2017-2626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5407">CVE-2016-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7942">CVE-2016-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7943">CVE-2016-7943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7944">CVE-2016-7944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7945">CVE-2016-7945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7946">CVE-2016-7946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7947">CVE-2016-7947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7948">CVE-2016-7948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7949">CVE-2016-7949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7950">CVE-2016-7950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7953">CVE-2016-7953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2624">CVE-2017-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2625">CVE-2017-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2626">CVE-2017-2626</uri>
</references>
<metadata tag="requester" timestamp="2017-03-18T13:24:57Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-04-10T21:30:03Z">BlueKnight</metadata>
diff --git a/glsa-201704-04.xml b/glsa-201704-04.xml
index 874fbb53..bb245d68 100644
--- a/glsa-201704-04.xml
+++ b/glsa-201704-04.xml
@@ -45,13 +45,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058">CVE-2017-3058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059">CVE-2017-3059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060">CVE-2017-3060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061">CVE-2017-3061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062">CVE-2017-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063">CVE-2017-3063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064">CVE-2017-3064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058">CVE-2017-3058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059">CVE-2017-3059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060">CVE-2017-3060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061">CVE-2017-3061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062">CVE-2017-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063">CVE-2017-3063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064">CVE-2017-3064</uri>
</references>
<metadata tag="requester" timestamp="2017-04-13T15:19:39Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-04-27T05:32:52Z">whissi</metadata>
diff --git a/glsa-201705-01.xml b/glsa-201705-01.xml
index a0e2962b..d1213aff 100644
--- a/glsa-201705-01.xml
+++ b/glsa-201705-01.xml
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10195">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10195">
CVE-2016-10195
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10196">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10196">
CVE-2016-10196
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10197">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10197">
CVE-2016-10197
</uri>
</references>
diff --git a/glsa-201705-02.xml b/glsa-201705-02.xml
index 2816380e..59a9c801 100644
--- a/glsa-201705-02.xml
+++ b/glsa-201705-02.xml
@@ -47,18 +47,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5057">CVE-2017-5057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5058">CVE-2017-5058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5059">CVE-2017-5059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5060">CVE-2017-5060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5061">CVE-2017-5061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5062">CVE-2017-5062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5063">CVE-2017-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5064">CVE-2017-5064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5065">CVE-2017-5065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5066">CVE-2017-5066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5067">CVE-2017-5067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5069">CVE-2017-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5057">CVE-2017-5057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5058">CVE-2017-5058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5059">CVE-2017-5059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5060">CVE-2017-5060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5061">CVE-2017-5061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5062">CVE-2017-5062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5063">CVE-2017-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5064">CVE-2017-5064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5065">CVE-2017-5065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5066">CVE-2017-5066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5067">CVE-2017-5067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5069">CVE-2017-5069</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T01:40:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:15:34Z">whissi</metadata>
diff --git a/glsa-201705-03.xml b/glsa-201705-03.xml
index 34124fe9..7420037b 100644
--- a/glsa-201705-03.xml
+++ b/glsa-201705-03.xml
@@ -61,14 +61,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T06:54:02Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:16:21Z">whissi</metadata>
diff --git a/glsa-201705-04.xml b/glsa-201705-04.xml
index d924eb64..65c6aee4 100644
--- a/glsa-201705-04.xml
+++ b/glsa-201705-04.xml
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5461">CVE-2017-5461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5462">CVE-2017-5462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5461">CVE-2017-5461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5462">CVE-2017-5462</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T13:52:41Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:17:08Z">whissi</metadata>
diff --git a/glsa-201705-05.xml b/glsa-201705-05.xml
index 91858eb0..e8cb5bdd 100644
--- a/glsa-201705-05.xml
+++ b/glsa-201705-05.xml
@@ -62,8 +62,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
</references>
<metadata tag="requester" timestamp="2017-05-07T18:51:14Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:30:37Z">whissi</metadata>
diff --git a/glsa-201705-06.xml b/glsa-201705-06.xml
index 821d1a35..ef54bb21 100644
--- a/glsa-201705-06.xml
+++ b/glsa-201705-06.xml
@@ -57,15 +57,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-04-26T01:32:17Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:36:09Z">whissi</metadata>
diff --git a/glsa-201705-07.xml b/glsa-201705-07.xml
index 10f7c6fa..f050b1d4 100644
--- a/glsa-201705-07.xml
+++ b/glsa-201705-07.xml
@@ -60,15 +60,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-05-06T17:25:08Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:41:25Z">whissi</metadata>
diff --git a/glsa-201705-08.xml b/glsa-201705-08.xml
index 1f598eeb..1ed0ff1f 100644
--- a/glsa-201705-08.xml
+++ b/glsa-201705-08.xml
@@ -49,12 +49,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3417">CVE-2015-3417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3062">CVE-2016-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3417">CVE-2015-3417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3062">CVE-2016-3062</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:09:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:51:34Z">whissi</metadata>
diff --git a/glsa-201705-09.xml b/glsa-201705-09.xml
index 5ea908a8..11ea71c1 100644
--- a/glsa-201705-09.xml
+++ b/glsa-201705-09.xml
@@ -63,20 +63,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5174">CVE-2015-5174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5345">CVE-2015-5345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5346">CVE-2015-5346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5351">CVE-2015-5351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0706">CVE-2016-0706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0714">CVE-2016-0714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0763">CVE-2016-0763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1240">CVE-2016-1240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3092">CVE-2016-3092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8745">CVE-2016-8745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5647">CVE-2017-5647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5648">CVE-2017-5648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5650">CVE-2017-5650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5651">CVE-2017-5651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5174">CVE-2015-5174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5345">CVE-2015-5345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5346">CVE-2015-5346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5351">CVE-2015-5351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0706">CVE-2016-0706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0714">CVE-2016-0714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0763">CVE-2016-0763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1240">CVE-2016-1240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3092">CVE-2016-3092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8745">CVE-2016-8745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5647">CVE-2017-5647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5648">CVE-2017-5648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5650">CVE-2017-5650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5651">CVE-2017-5651</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T05:58:37Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-18T01:49:59Z">whissi</metadata>
diff --git a/glsa-201705-10.xml b/glsa-201705-10.xml
index 727cf07c..c54cbb15 100644
--- a/glsa-201705-10.xml
+++ b/glsa-201705-10.xml
@@ -83,37 +83,37 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10198">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10198">
CVE-2016-10198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10199">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10199">
CVE-2016-10199
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9445">CVE-2016-9445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9446">CVE-2016-9446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9447">CVE-2016-9447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9634">CVE-2016-9634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9635">CVE-2016-9635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9636">CVE-2016-9636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807">CVE-2016-9807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808">CVE-2016-9808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809">CVE-2016-9809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810">CVE-2016-9810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811">CVE-2016-9811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812">CVE-2016-9812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813">CVE-2016-9813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5837">CVE-2017-5837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5838">CVE-2017-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5839">CVE-2017-5839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5840">CVE-2017-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5841">CVE-2017-5841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5842">CVE-2017-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5843">CVE-2017-5843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5844">CVE-2017-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5845">CVE-2017-5845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5846">CVE-2017-5846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5847">CVE-2017-5847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5848">CVE-2017-5848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9445">CVE-2016-9445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9446">CVE-2016-9446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9447">CVE-2016-9447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9634">CVE-2016-9634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9635">CVE-2016-9635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9636">CVE-2016-9636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807">CVE-2016-9807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808">CVE-2016-9808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809">CVE-2016-9809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810">CVE-2016-9810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811">CVE-2016-9811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812">CVE-2016-9812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813">CVE-2016-9813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5837">CVE-2017-5837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5838">CVE-2017-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5839">CVE-2017-5839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5840">CVE-2017-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5841">CVE-2017-5841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5842">CVE-2017-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5843">CVE-2017-5843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5844">CVE-2017-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5845">CVE-2017-5845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5846">CVE-2017-5846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5847">CVE-2017-5847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5848">CVE-2017-5848</uri>
</references>
<metadata tag="requester" timestamp="2017-05-07T18:49:56Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-18T02:03:55Z">whissi</metadata>
diff --git a/glsa-201705-11.xml b/glsa-201705-11.xml
index 1984fe58..0575962f 100644
--- a/glsa-201705-11.xml
+++ b/glsa-201705-11.xml
@@ -66,9 +66,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8903">CVE-2017-8903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8904">CVE-2017-8904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8905">CVE-2017-8905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8903">CVE-2017-8903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8904">CVE-2017-8904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8905">CVE-2017-8905</uri>
</references>
<metadata tag="requester" timestamp="2017-05-11T07:53:09Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:07:35Z">BlueKnight</metadata>
diff --git a/glsa-201705-12.xml b/glsa-201705-12.xml
index a9b7a584..8b8fc3da 100644
--- a/glsa-201705-12.xml
+++ b/glsa-201705-12.xml
@@ -46,13 +46,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3068">CVE-2017-3068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3069">CVE-2017-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3070">CVE-2017-3070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3071">CVE-2017-3071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3072">CVE-2017-3072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3073">CVE-2017-3073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3074">CVE-2017-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3068">CVE-2017-3068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3069">CVE-2017-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3070">CVE-2017-3070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3071">CVE-2017-3071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3072">CVE-2017-3072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3073">CVE-2017-3073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3074">CVE-2017-3074</uri>
</references>
<metadata tag="requester" timestamp="2017-05-11T07:37:48Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:07:53Z">BlueKnight</metadata>
diff --git a/glsa-201705-13.xml b/glsa-201705-13.xml
index f807980a..b7df66ba 100644
--- a/glsa-201705-13.xml
+++ b/glsa-201705-13.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9400">CVE-2016-9400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9400">CVE-2016-9400</uri>
</references>
<metadata tag="requester" timestamp="2017-05-09T06:08:59Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:22:30Z">BlueKnight</metadata>
diff --git a/glsa-201705-14.xml b/glsa-201705-14.xml
index d41d227e..e1ed975a 100644
--- a/glsa-201705-14.xml
+++ b/glsa-201705-14.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8849">CVE-2017-8849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8849">CVE-2017-8849</uri>
</references>
<metadata tag="requester" timestamp="2017-05-12T04:22:20Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T12:18:57Z">BlueKnight</metadata>
diff --git a/glsa-201705-15.xml b/glsa-201705-15.xml
index 688fe87c..a7507152 100644
--- a/glsa-201705-15.xml
+++ b/glsa-201705-15.xml
@@ -48,7 +48,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000367">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000367">
CVE-2017-1000367
</uri>
</references>
diff --git a/glsa-201706-02.xml b/glsa-201706-02.xml
index 97ad98df..e1d3f858 100644
--- a/glsa-201706-02.xml
+++ b/glsa-201706-02.xml
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T23:12:11Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:29:12Z">whissi</metadata>
diff --git a/glsa-201706-03.xml b/glsa-201706-03.xml
index d23c13f5..7c718080 100644
--- a/glsa-201706-03.xml
+++ b/glsa-201706-03.xml
@@ -56,20 +56,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:36:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:41:28Z">whissi</metadata>
diff --git a/glsa-201706-04.xml b/glsa-201706-04.xml
index 33dbc80b..d2ba84a5 100644
--- a/glsa-201706-04.xml
+++ b/glsa-201706-04.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:04:29Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:25Z">whissi</metadata>
diff --git a/glsa-201706-06.xml b/glsa-201706-06.xml
index 900a24ba..2664a320 100644
--- a/glsa-201706-06.xml
+++ b/glsa-201706-06.xml
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:32:49Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:56Z">whissi</metadata>
diff --git a/glsa-201706-07.xml b/glsa-201706-07.xml
index 73814200..b6a3b625 100644
--- a/glsa-201706-07.xml
+++ b/glsa-201706-07.xml
@@ -57,7 +57,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:26:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T11:58:19Z">whissi</metadata>
diff --git a/glsa-201706-08.xml b/glsa-201706-08.xml
index a57a37f0..e996de21 100644
--- a/glsa-201706-08.xml
+++ b/glsa-201706-08.xml
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
CVE-2016-10221
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:28:46Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:34:32Z">whissi</metadata>
diff --git a/glsa-201706-09.xml b/glsa-201706-09.xml
index f6f851c7..79c6f3af 100644
--- a/glsa-201706-09.xml
+++ b/glsa-201706-09.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
<uri link="https://security.gentoo.org/glsa/201703-03">GLSA 201703-03</uri>
</references>
<metadata tag="requester" timestamp="2017-06-04T11:05:52Z">whissi</metadata>
diff --git a/glsa-201706-10.xml b/glsa-201706-10.xml
index f694d038..b1e971eb 100644
--- a/glsa-201706-10.xml
+++ b/glsa-201706-10.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:30:00Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:36:09Z">whissi</metadata>
diff --git a/glsa-201706-11.xml b/glsa-201706-11.xml
index fc7b7503..a8d394f8 100644
--- a/glsa-201706-11.xml
+++ b/glsa-201706-11.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
</references>
<metadata tag="requester" timestamp="2017-04-26T00:55:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:43:31Z">whissi</metadata>
diff --git a/glsa-201706-12.xml b/glsa-201706-12.xml
index 960b5cb8..4e3a08e5 100644
--- a/glsa-201706-12.xml
+++ b/glsa-201706-12.xml
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:23:51Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:48:46Z">whissi</metadata>
diff --git a/glsa-201706-13.xml b/glsa-201706-13.xml
index eadd5098..a93bb37e 100644
--- a/glsa-201706-13.xml
+++ b/glsa-201706-13.xml
@@ -43,7 +43,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T12:15:55Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:02:58Z">whissi</metadata>
diff --git a/glsa-201706-14.xml b/glsa-201706-14.xml
index 67f67bb4..6a208aaa 100644
--- a/glsa-201706-14.xml
+++ b/glsa-201706-14.xml
@@ -44,17 +44,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
CVE-2016-10244
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
CVE-2016-10328
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
</references>
<metadata tag="requester" timestamp="2017-04-11T06:23:01Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:06:36Z">whissi</metadata>
diff --git a/glsa-201706-15.xml b/glsa-201706-15.xml
index d7c2f08d..7543eef7 100644
--- a/glsa-201706-15.xml
+++ b/glsa-201706-15.xml
@@ -47,105 +47,105 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:44:45Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-07T11:52:15Z">whissi</metadata>
diff --git a/glsa-201706-16.xml b/glsa-201706-16.xml
index f6944b12..6c72435e 100644
--- a/glsa-201706-16.xml
+++ b/glsa-201706-16.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6508">CVE-2017-6508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6508">CVE-2017-6508</uri>
</references>
<metadata tag="requester" timestamp="2017-03-23T20:33:13Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:09:12Z">whissi</metadata>
diff --git a/glsa-201706-17.xml b/glsa-201706-17.xml
index 5b704e20..7909b2b4 100644
--- a/glsa-201706-17.xml
+++ b/glsa-201706-17.xml
@@ -51,8 +51,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314">CVE-2017-8314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314">CVE-2017-8314</uri>
</references>
<metadata tag="requester" timestamp="2017-06-06T16:37:32Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:18:36Z">whissi</metadata>
diff --git a/glsa-201706-18.xml b/glsa-201706-18.xml
index 79e77936..c527af9f 100644
--- a/glsa-201706-18.xml
+++ b/glsa-201706-18.xml
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291">CVE-2015-5291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2784">CVE-2017-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291">CVE-2015-5291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2784">CVE-2017-2784</uri>
</references>
<metadata tag="requester" timestamp="2017-04-17T22:12:43Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:42:02Z">whissi</metadata>
diff --git a/glsa-201706-19.xml b/glsa-201706-19.xml
index 6869b02f..537ce903 100644
--- a/glsa-201706-19.xml
+++ b/glsa-201706-19.xml
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5180">CVE-2015-5180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6323">CVE-2016-6323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000366">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5180">CVE-2015-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6323">CVE-2016-6323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000366">
CVE-2017-1000366
</uri>
<uri link="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt">
diff --git a/glsa-201706-20.xml b/glsa-201706-20.xml
index e649e4f7..e4f6e71c 100644
--- a/glsa-201706-20.xml
+++ b/glsa-201706-20.xml
@@ -49,27 +49,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5068">CVE-2017-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5070">CVE-2017-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5071">CVE-2017-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5072">CVE-2017-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5073">CVE-2017-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5074">CVE-2017-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5075">CVE-2017-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5076">CVE-2017-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5077">CVE-2017-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5078">CVE-2017-5078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5079">CVE-2017-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5080">CVE-2017-5080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5081">CVE-2017-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5082">CVE-2017-5082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5083">CVE-2017-5083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5084">CVE-2017-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5085">CVE-2017-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5086">CVE-2017-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5087">CVE-2017-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5088">CVE-2017-5088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5089">CVE-2017-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5068">CVE-2017-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5070">CVE-2017-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5071">CVE-2017-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5072">CVE-2017-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5073">CVE-2017-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5074">CVE-2017-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5075">CVE-2017-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5076">CVE-2017-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5077">CVE-2017-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5078">CVE-2017-5078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5079">CVE-2017-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5080">CVE-2017-5080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5081">CVE-2017-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5082">CVE-2017-5082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5083">CVE-2017-5083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5084">CVE-2017-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5085">CVE-2017-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5086">CVE-2017-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5087">CVE-2017-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5088">CVE-2017-5088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5089">CVE-2017-5089</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T11:21:16Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T19:00:15Z">whissi</metadata>
diff --git a/glsa-201706-21.xml b/glsa-201706-21.xml
index 99ca39f1..630365e6 100644
--- a/glsa-201706-21.xml
+++ b/glsa-201706-21.xml
@@ -50,7 +50,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6489">CVE-2016-6489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6489">CVE-2016-6489</uri>
<uri link="https://eprint.iacr.org/2016/596.pdf">Cache Attacks Enable Bulk
Key Recovery on the Cloud
</uri>
diff --git a/glsa-201706-22.xml b/glsa-201706-22.xml
index be211ab8..613cd43b 100644
--- a/glsa-201706-22.xml
+++ b/glsa-201706-22.xml
@@ -49,7 +49,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4579">CVE-2016-4579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4579">CVE-2016-4579</uri>
<uri link="http://seclists.org/oss-sec/2016/q3/343">Upstream report</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T05:51:10Z">BlueKnight</metadata>
diff --git a/glsa-201706-23.xml b/glsa-201706-23.xml
index fa5e549d..572f924a 100644
--- a/glsa-201706-23.xml
+++ b/glsa-201706-23.xml
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1412">CVE-2011-1412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2764">CVE-2011-2764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3012">CVE-2011-3012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3345">CVE-2012-3345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1412">CVE-2011-1412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2764">CVE-2011-2764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3012">CVE-2011-3012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3345">CVE-2012-3345</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T11:09:47Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-22T17:57:40Z">whissi</metadata>
diff --git a/glsa-201706-24.xml b/glsa-201706-24.xml
index c10f3756..71b4cf5d 100644
--- a/glsa-201706-24.xml
+++ b/glsa-201706-24.xml
@@ -47,7 +47,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9601">CVE-2016-9601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9601">CVE-2016-9601</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:06:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T18:31:34Z">whissi</metadata>
diff --git a/glsa-201706-25.xml b/glsa-201706-25.xml
index 7d91e61d..e0521339 100644
--- a/glsa-201706-25.xml
+++ b/glsa-201706-25.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5436">CVE-2017-5436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5436">CVE-2017-5436</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:18:42Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T19:02:00Z">whissi</metadata>
diff --git a/glsa-201706-26.xml b/glsa-201706-26.xml
index c7746a75..815c661e 100644
--- a/glsa-201706-26.xml
+++ b/glsa-201706-26.xml
@@ -57,9 +57,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5953">CVE-2017-5953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6349">CVE-2017-6349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6350">CVE-2017-6350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5953">CVE-2017-5953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6349">CVE-2017-6349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6350">CVE-2017-6350</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:30:35Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T19:18:53Z">whissi</metadata>
diff --git a/glsa-201706-27.xml b/glsa-201706-27.xml
index 5fb7503d..197bd343 100644
--- a/glsa-201706-27.xml
+++ b/glsa-201706-27.xml
@@ -48,7 +48,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T12:42:38Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:00Z">whissi</metadata>
diff --git a/glsa-201706-28.xml b/glsa-201706-28.xml
index 26737415..8f891d74 100644
--- a/glsa-201706-28.xml
+++ b/glsa-201706-28.xml
@@ -57,10 +57,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
CVE-2016-10327
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
</references>
<metadata tag="requester" timestamp="2017-06-08T18:53:54Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:51Z">whissi</metadata>
diff --git a/glsa-201706-29.xml b/glsa-201706-29.xml
index 32e43c22..736ad4df 100644
--- a/glsa-201706-29.xml
+++ b/glsa-201706-29.xml
@@ -60,7 +60,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
</references>
<metadata tag="requester" timestamp="2017-06-06T14:01:55Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:58:27Z">whissi</metadata>
diff --git a/glsa-201707-01.xml b/glsa-201707-01.xml
index 0e8127a8..93ce0744 100644
--- a/glsa-201707-01.xml
+++ b/glsa-201707-01.xml
@@ -63,28 +63,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-01-31T16:38:05Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-05T09:02:19Z">whissi</metadata>
diff --git a/glsa-201707-02.xml b/glsa-201707-02.xml
index a4b3619c..4778cde3 100644
--- a/glsa-201707-02.xml
+++ b/glsa-201707-02.xml
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:27:52Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:04:13Z">whissi</metadata>
diff --git a/glsa-201707-04.xml b/glsa-201707-04.xml
index 56c18c13..3f22c0a8 100644
--- a/glsa-201707-04.xml
+++ b/glsa-201707-04.xml
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:41:05Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:06:09Z">whissi</metadata>
diff --git a/glsa-201707-05.xml b/glsa-201707-05.xml
index 0cb33cde..8409a858 100644
--- a/glsa-201707-05.xml
+++ b/glsa-201707-05.xml
@@ -47,10 +47,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T02:50:48Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:06:57Z">whissi</metadata>
diff --git a/glsa-201707-06.xml b/glsa-201707-06.xml
index d0e10b87..768c54d4 100644
--- a/glsa-201707-06.xml
+++ b/glsa-201707-06.xml
@@ -53,22 +53,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
CVE-2016-10163
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
CVE-2016-10214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:14:09Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:08:07Z">whissi</metadata>
diff --git a/glsa-201707-07.xml b/glsa-201707-07.xml
index 3883bc8d..2fb929cc 100644
--- a/glsa-201707-07.xml
+++ b/glsa-201707-07.xml
@@ -48,10 +48,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T19:55:35Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:08:50Z">whissi</metadata>
diff --git a/glsa-201707-08.xml b/glsa-201707-08.xml
index e995761d..7e1bd106 100644
--- a/glsa-201707-08.xml
+++ b/glsa-201707-08.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:04:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:09:29Z">whissi</metadata>
diff --git a/glsa-201707-09.xml b/glsa-201707-09.xml
index 50abfa74..bb1e2005 100644
--- a/glsa-201707-09.xml
+++ b/glsa-201707-09.xml
@@ -46,7 +46,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:44:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:10:08Z">whissi</metadata>
diff --git a/glsa-201707-10.xml b/glsa-201707-10.xml
index e2edaa00..d2d9c613 100644
--- a/glsa-201707-10.xml
+++ b/glsa-201707-10.xml
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
</references>
<metadata tag="requester" timestamp="2017-06-28T11:50:57Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:11:58Z">b-man</metadata>
diff --git a/glsa-201707-11.xml b/glsa-201707-11.xml
index 033caea6..ddb1ee86 100644
--- a/glsa-201707-11.xml
+++ b/glsa-201707-11.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
</references>
<metadata tag="requester" timestamp="2017-06-19T11:26:16Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:12:11Z">b-man</metadata>
diff --git a/glsa-201707-12.xml b/glsa-201707-12.xml
index caa2d698..bbedad24 100644
--- a/glsa-201707-12.xml
+++ b/glsa-201707-12.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T16:57:30Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:10:41Z">whissi</metadata>
diff --git a/glsa-201707-13.xml b/glsa-201707-13.xml
index 1b3fb1d5..5c678590 100644
--- a/glsa-201707-13.xml
+++ b/glsa-201707-13.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:37:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:11:14Z">whissi</metadata>
diff --git a/glsa-201707-14.xml b/glsa-201707-14.xml
index 47f06c03..98a8fcfa 100644
--- a/glsa-201707-14.xml
+++ b/glsa-201707-14.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10376">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10376">
CVE-2016-10376
</uri>
</references>
diff --git a/glsa-201707-15.xml b/glsa-201707-15.xml
index a70694e5..83b4156e 100644
--- a/glsa-201707-15.xml
+++ b/glsa-201707-15.xml
@@ -45,18 +45,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3075">CVE-2017-3075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3076">CVE-2017-3076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3077">CVE-2017-3077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3078">CVE-2017-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3079">CVE-2017-3079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3080">CVE-2017-3080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3081">CVE-2017-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3082">CVE-2017-3082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3083">CVE-2017-3083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3084">CVE-2017-3084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3099">CVE-2017-3099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3100">CVE-2017-3100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3075">CVE-2017-3075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3076">CVE-2017-3076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3077">CVE-2017-3077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3078">CVE-2017-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3079">CVE-2017-3079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3080">CVE-2017-3080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3081">CVE-2017-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3082">CVE-2017-3082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3083">CVE-2017-3083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3084">CVE-2017-3084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3099">CVE-2017-3099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3100">CVE-2017-3100</uri>
</references>
<metadata tag="requester" timestamp="2017-07-16T01:48:22Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-07-21T23:12:54Z">b-man</metadata>
diff --git a/glsa-201708-01.xml b/glsa-201708-01.xml
index a3b2606f..edbd0a99 100644
--- a/glsa-201708-01.xml
+++ b/glsa-201708-01.xml
@@ -45,16 +45,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131">CVE-2016-9131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147">CVE-2016-9147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444">CVE-2016-9444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9778">CVE-2016-9778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3135">CVE-2017-3135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3136">CVE-2017-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3137">CVE-2017-3137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3138">CVE-2017-3138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3140">CVE-2017-3140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3141">CVE-2017-3141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131">CVE-2016-9131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147">CVE-2016-9147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444">CVE-2016-9444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9778">CVE-2016-9778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3135">CVE-2017-3135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3136">CVE-2017-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3137">CVE-2017-3137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3138">CVE-2017-3138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3140">CVE-2017-3140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3141">CVE-2017-3141</uri>
</references>
<metadata tag="requester" timestamp="2017-06-08T18:18:24Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-17T02:10:16Z">whissi</metadata>
diff --git a/glsa-201708-02.xml b/glsa-201708-02.xml
index 3c99f732..4364855a 100644
--- a/glsa-201708-02.xml
+++ b/glsa-201708-02.xml
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307">CVE-2017-6307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308">CVE-2017-6308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309">CVE-2017-6309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310">CVE-2017-6310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8911">CVE-2017-8911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307">CVE-2017-6307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308">CVE-2017-6308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309">CVE-2017-6309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310">CVE-2017-6310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8911">CVE-2017-8911</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:12:51Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-17T03:12:51Z">whissi</metadata>
diff --git a/glsa-201708-04.xml b/glsa-201708-04.xml
index 70915b98..ef51b762 100644
--- a/glsa-201708-04.xml
+++ b/glsa-201708-04.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8296">CVE-2017-8296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8296">CVE-2017-8296</uri>
</references>
<metadata tag="requester" timestamp="2017-08-14T23:18:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:46:29Z">b-man</metadata>
diff --git a/glsa-201708-05.xml b/glsa-201708-05.xml
index 72e79c5c..da12d4e1 100644
--- a/glsa-201708-05.xml
+++ b/glsa-201708-05.xml
@@ -58,7 +58,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
</references>
<metadata tag="requester" timestamp="2017-06-21T12:23:53Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:03:02Z">b-man</metadata>
diff --git a/glsa-201708-06.xml b/glsa-201708-06.xml
index 916c67fc..7ec22131 100644
--- a/glsa-201708-06.xml
+++ b/glsa-201708-06.xml
@@ -48,16 +48,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10219">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10219">
CVE-2016-10219
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10220">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10220">
CVE-2016-10220
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5951">CVE-2017-5951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6196">CVE-2017-6196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7207">CVE-2017-7207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8291">CVE-2017-8291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5951">CVE-2017-5951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6196">CVE-2017-6196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7207">CVE-2017-7207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8291">CVE-2017-8291</uri>
</references>
<metadata tag="requester" timestamp="2017-07-17T22:58:42Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:03:33Z">b-man</metadata>
diff --git a/glsa-201708-08.xml b/glsa-201708-08.xml
index 3cc37835..0484af4b 100644
--- a/glsa-201708-08.xml
+++ b/glsa-201708-08.xml
@@ -46,7 +46,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3189">CVE-2016-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3189">CVE-2016-3189</uri>
</references>
<metadata tag="requester" timestamp="2017-06-04T20:39:15Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:24:45Z">whissi</metadata>
diff --git a/glsa-201708-09.xml b/glsa-201708-09.xml
index 8a4b54e0..b2956f44 100644
--- a/glsa-201708-09.xml
+++ b/glsa-201708-09.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7392">CVE-2016-7392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9153">CVE-2017-9153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7392">CVE-2016-7392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9153">CVE-2017-9153</uri>
</references>
<metadata tag="requester" timestamp="2017-08-22T03:00:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:47:40Z">b-man</metadata>
diff --git a/glsa-201708-10.xml b/glsa-201708-10.xml
index a65b1b12..b901b3c1 100644
--- a/glsa-201708-10.xml
+++ b/glsa-201708-10.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7885">CVE-2017-7885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7975">CVE-2017-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7976">CVE-2017-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7885">CVE-2017-7885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7975">CVE-2017-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7976">CVE-2017-7976</uri>
</references>
<metadata tag="requester" timestamp="2017-08-02T02:58:46Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:52:50Z">ackle</metadata>
diff --git a/glsa-201709-01.xml b/glsa-201709-01.xml
index 3aa8b6e9..38552909 100644
--- a/glsa-201709-01.xml
+++ b/glsa-201709-01.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2292">CVE-2017-2292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2292">CVE-2017-2292</uri>
</references>
<metadata tag="requester" timestamp="2017-08-26T22:18:27Z">Zlogene</metadata>
<metadata tag="submitter" timestamp="2017-09-04T22:33:20Z">b-man</metadata>
diff --git a/glsa-201709-13.xml b/glsa-201709-13.xml
index 65d0d96e..74eb4cdf 100644
--- a/glsa-201709-13.xml
+++ b/glsa-201709-13.xml
@@ -43,7 +43,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7692">CVE-2017-7692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7692">CVE-2017-7692</uri>
</references>
<metadata tag="requester" timestamp="2017-09-08T23:47:24Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-09-17T20:28:22Z">b-man</metadata>
diff --git a/glsa-201709-14.xml b/glsa-201709-14.xml
index 17ac2965..4ad84f00 100644
--- a/glsa-201709-14.xml
+++ b/glsa-201709-14.xml
@@ -45,17 +45,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000099">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000099">
CVE-2017-1000099
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000100">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000100">
CVE-2017-1000100
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000101">
CVE-2017-1000101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7407">CVE-2017-7407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7468">CVE-2017-7468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7407">CVE-2017-7407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7468">CVE-2017-7468</uri>
</references>
<metadata tag="requester" timestamp="2017-09-03T21:18:02Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-09-17T21:18:05Z">b-man</metadata>
diff --git a/glsa-201709-20.xml b/glsa-201709-20.xml
index 7b530cd1..2a588007 100644
--- a/glsa-201709-20.xml
+++ b/glsa-201709-20.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://www.postfix.org/announcements/postfix-3.2.2.html">Postfix
+ <uri link="https://www.postfix.org/announcements/postfix-3.2.2.html">Postfix
Official Announce
</uri>
</references>
diff --git a/glsa-201709-22.xml b/glsa-201709-22.xml
index 7a82f604..07d405d0 100644
--- a/glsa-201709-22.xml
+++ b/glsa-201709-22.xml
@@ -91,94 +91,94 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10053">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10053">
CVE-2017-10053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10067">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10067">
CVE-2017-10067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10074">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10074">
CVE-2017-10074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10078">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10078">
CVE-2017-10078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10081">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10081">
CVE-2017-10081
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10086">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10086">
CVE-2017-10086
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10087">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10087">
CVE-2017-10087
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10089">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10089">
CVE-2017-10089
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10090">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10090">
CVE-2017-10090
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10096">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10096">
CVE-2017-10096
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10101">
CVE-2017-10101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10102">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10102">
CVE-2017-10102
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10105">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10105">
CVE-2017-10105
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10107">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10107">
CVE-2017-10107
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10108">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10108">
CVE-2017-10108
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10109">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10109">
CVE-2017-10109
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10110">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10110">
CVE-2017-10110
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10111">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10111">
CVE-2017-10111
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10114">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10114">
CVE-2017-10114
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10115">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10115">
CVE-2017-10115
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10116">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10116">
CVE-2017-10116
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10117">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10117">
CVE-2017-10117
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10118">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10118">
CVE-2017-10118
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10121">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10121">
CVE-2017-10121
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10125">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10125">
CVE-2017-10125
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10135">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10135">
CVE-2017-10135
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10176">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10176">
CVE-2017-10176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10193">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10193">
CVE-2017-10193
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10198">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10198">
CVE-2017-10198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10243">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10243">
CVE-2017-10243
</uri>
</references>
diff --git a/glsa-201709-24.xml b/glsa-201709-24.xml
index 33ce19ee..ec851070 100644
--- a/glsa-201709-24.xml
+++ b/glsa-201709-24.xml
@@ -57,7 +57,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12940">
CVE-2017-12940
</uri>
diff --git a/glsa-201709-27.xml b/glsa-201709-27.xml
index 91985726..e9207308 100644
--- a/glsa-201709-27.xml
+++ b/glsa-201709-27.xml
@@ -102,7 +102,7 @@
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7602">
CVE-2017-7602
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9403">CVE-2017-9403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9403">CVE-2017-9403</uri>
</references>
<metadata tag="requester" timestamp="2017-09-26T15:05:13Z">chrisadr</metadata>
<metadata tag="submitter" timestamp="2017-09-26T22:14:50Z">chrisadr</metadata>